Palo Alto Networks Accredited Systems Engineer (PSE): Foundation Accreditation Exam


Question 1. Which four options are paramount to a prevention-oriented platform? (Choose four.)
A. automatic counterattacks to security breaches
B. response plans for ransomware and denial-of-service attacks
C. cloud-computing protection
D. visibility of users, applications, and traffic
E. unknown threat prevention
F. known threat prevention

Question 2. Which two capabilities are provided by the Panorama or firewall ACC? (Choose two.)
A. a convenient interface to define security zones
B. access to all commands used to invoke or control applications
C. accounting information about licenses associated with applications
D. information about applications themselves and the traffic used by the applications
E. a visual presentation of applications coded by risk

Question 3. How does a partner access the Foundation Platform demo environment?
A. by using its AWS account with a VM-Series license provided by Palo Alto Networks
B. The demo is available only to Palo Alto Networks employees.
C. by running it from a purchased and configured firewall
D. by using the Partner Portal
Answer: D

Question 4. The VM-Series firewalls support which five environments? (Choose five.)
A. Google Cloud Platform
B. Azure
C. Citrix XenServer
E. VMware NSX
F. Linux VServer
G. VMware ESXi
Answer: A,B,D,E,G

Question 5. Which option describes WildFire®?
A. It provides an Analysis Summary that summarizes a firewall’s ability to reduce the attack surface of an environment.
B. It is a controlling firewall that provides configuration rules that controlled firewalls must submit to.
C. It is a general-purpose hash-generation and match process used in firewalls as an early step in their session processing.
D. It provides cloud-delivered malware analysis on files submitted to it.
Answer: D

Question 6. True or false: Content-¬ID technology combines results from WildFire® analysis with administrator¬-defined policies to inspect and control content traversing the firewall, using data-loss prevention techniques in a single, unified engine.
A. True
B. False
Answer: B

Question 7. How frequently are WildFire® updates about previously unknown files delivered from the cloud to customers with a WildFire subscription?
A. every 60 minutes
B. every day
C. every 5 minutes
D. every 30 minutes
E. every 15 minutes
Answer: C

Question 8. What is the mission of Palo Alto Networks?
A. to teach corporate and governmental organizations worldwide about their exposure to cybersecurity risks
B. to maintain the highest revenue growth rate among the top five vendors in the cybersecurity industry
C. to productize and monetize the best big data and AI approaches to providing digital security
D. to protect our way of life in the digital age by preventing successful cyberattacks
Answer: D

Question 9. Palo Alto Networks platform products commonly are deployed in which four critical places in the network to solve many of today’s enterprise security problems? (Choose four.)
A. internet perimeter
B. branch office
C. data center perimeter
D. mobile or endpoint device
E. vehicle-mounted hotspot
F. video game console
Answer: A,B,C,D

Question 10. Which percentage represents the total revenue compound annual growth rate for Palo Alto Networks during the fiscal years 2014 through 2018?
A. 80%
B. 5%
C. 10%
D. 40%
E. 20%
Answer: D

Question 11. What are three subscriptions for the next-generation firewall? (Choose three.)
A. App-ID
B. SSL Decryption
C. Content-ID
D. URL Filtering
E. User-ID
F. Threat Prevention
G. WildFire®
Answer: D,F,G

Question 12. Which two PAN-OS® user interface tabs would an administrator use to identify compromised users after a spike in dangerous traffic is observed? (Choose two.)
B. Device
C. Network
D. Objects
E. Policies
F. Monitor

Question 13. Which statement is true about how WildFire® scans files for viruses, malware, and spyware?
A. For WildFire to be most effective, you need to deploy a WF-500 appliance to get the full benefits of WildFire threat intelligence scanning.
B. The firewall must have a WildFire Analysis Profile rule attached to a Security policy rule that will scan files for viruses, malware, and spyware.
C. A WildFire Analysis Profile needs to be set to define which files to forward to the WildFire cloud to trigger inspection for zero-day malware.
D. The firewall must have policy rules in place before it can forward a questionable file to WildFire, where the file is analyzed for zero-day malware.
Answer: B

Question 14. What are the three essential components of a Magnifier deployment? (Choose three.)
A. Pathfinder
B. AutoFocus logs
C. Aperture logs
D. Panorama
E. Logging Service
F. Log Collector
G. MineMeld

Question 15. What is the function of the Decryption Broker on the next-generation firewall?
A. eliminate the need for a third-party SSL decryption solution and reduce the number of thirdparty devices performing traffic analysis and enforcement
B. decode applications and URL traffic coming through the firewall and assign priority to specific traffic patterns according to geographical location
C. function as centralized communication between firewalls for decoding traffic content
D. consolidate all the information from scans for unknown malware, system status, and system health alerts of the firewall into one central broker interface

Question 16. Which security functions typically are provided by neither public cloud vendors nor SaaS vendors?
A. preventing data exposure through improper sharing
B. SaaS vendor infrastructure protection from data loss
C. securing against internet-based denial-of-service attacks
D. securing physical network and hypervisors from attackers
Answer: A

Question 17. Which two are cybersecurity platform competitors of Palo Alto Networks? (Choose two).
A. SentinelOne
B. Check Point
C. Fortinet
D. Zscalar
E. Netskope
Answer: B,C

Question 18. Which trend involves cyberattackers and technology advancement?
A. The ever-decreasing cost of computing power enables cybercriminals to launch automated, sophisticated attacks at ever-decreasing costs.
B. The ever-increasing sophistication of computing technology brings an ever-increasing hurdle for would-be attackers.
C. The ever-increasing number, power, and sophistication of cyberattacks makes cyberprevention technology increasingly futile.
D. The ever-increasing power of cybersecurity prevention platforms makes cyberattacks and their attackers less and less relevant.
Answer: A

Question 19. Which option describes Panorama?
A. provides centralized management for multiple firewalls
B. provides early visibility into new features of the firewall’s operating system, PAN-OS®
C. the name of the web interface for the next-generation firewall
D. a tab on the firewall’s web interface that provides management functionality beyond that provided by other tabs
Answer: A

Question 20. The second evolution of the cybersecurity industry results in consistent security across multiple places in the data center and cloud computing environments. How is Palo Alto Networks driving the next evolution in the industry?
A. by providing visibility and enforcement to facilitate ease of consumption of new innovative technologies
B. by providing its own cloud infrastructure complete with cybersecurity for organizations to migrate to
C. by building security into the operating systems that run on hypervisors and into the applications that run on containers
D. by integrating all cybersecurity functions onto a single board or chip
Answer: A

Question 21. How does the Log Collector differ from the Logging Service?
A. The Log Collector provides a centralized repository for your on-premises and virtual firewalls, and the Logging Service provides only data isolation to avoid cross-contamination of logs.
B. The Log Collector is hardware-based, and the Logging Service is scalable on demand.
C. The Log Collector has built-in log redundancy, and the Logging Service has no cloud compliance requirements.
D. The Log Collector ensures redundancy by having multiple copies of your log database, and the Logging Service is regionalized based on your location.

Question 22. What are two features of the Traps management service? (Choose two.)
A. deployed as a cloud-managed service solution
B. requires no server licenses or databases
C. deployed with your own hardware and infrastructure
D. integrates with GlobalProtect into a single agent that manages both endpoint protection and mobile user connectivity
Answer: A,B

Question 23. True or false: PAN-¬DB is a service that aligns URLs with category types defined by Palo Alto Networks in which websites are classified through various means, including data provided by the Threat Intelligence Cloud.
A. True
B. False
Answer: A

Question 24. What are five benefits of Palo Alto Networks next-generation firewalls? (Choose five.)
A. easy-to-use interface that is the same on all models
B. comprehensive security platform designed to scale functionality over time
C. seamless integration with the WildFire® Threat Intelligence Cloud
D. feature-specific modular hardware
E. predictable throughput
F. identical security features on all models
G. convenient configuration wizard

Question 25. Which three statements represent the relationship between Palo Alto Networks product quality and partner growth opportunity? (Choose three.)
A. Customer product revenue over time tends to become high multiples of initial product purchases, thus making new customer acquisition cost-effective.
B. Palo Alto Networks product quality and usability is low, so partners can grow revenue, thus providing significant service and assistance to customers.
C. The Palo Alto Networks Security Operating Platform is future-oriented, so a land-and-expand strategy with customers often is rewarding.
D. Palo Alto Networks product quality and service is high, so partner engineering time need not be allocated to achieving basic functionality.
Answer: A,C,D

Question 26. Which factor does not impact sizing decisions?
A. sessions
B. performance
C. decryption
D. number of policy rules
E. redundancy
F. number of applications

Question 27. Which three platform components does WildFire® automatically update after finding malicious activity in previously unknown files, URLs, and APKs? (Choose three.)
A. management
B. host information profiles
C. malware signatures
D. decrypt
E. URL filtering
F. command-and-control signatures
Answer: C,E,F


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.