Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Paloalto Networks > PSE-Strata Professional > PSE-Strata-Pro-24

PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Question and Answers

Question # 4

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.

Full Access
Question # 5

What are three valid Panorama deployment options? (Choose three.)

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)

Full Access
Question # 6

Which three use cases are specific to Policy Optimizer? (Choose three.)

A.

Discovering applications on the network and transitions to application-based policy over time

B.

Converting broad rules based on application filters into narrow rules based on application groups

C.

Enabling migration from port-based rules to application-based rules

D.

Discovering 5-tuple attributes that can be simplified to 4-tuple attributes

E.

Automating the tagging of rules based on historical log data

Full Access
Question # 7

Which three descriptions apply to a perimeter firewall? (Choose three.)

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Full Access
Question # 8

The PAN-OS User-ID integrated agent is included with PAN-OS software and comes in which two forms? (Choose two.)

A.

Integrated agent

B.

GlobalProtect agent

C.

Windows-based agent

D.

Cloud Identity Engine (CIE)

Full Access
Question # 9

Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)

A.

Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.

B.

Apply decryption where possible to inspect and log all new and existing traffic flows.

C.

Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.

D.

Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.

Full Access
Question # 10

A company plans to deploy identity for improved visibility and identity-based controls for least privilege access to applications and data. The company does not have an on-premises Active Directory (AD) deployment, and devices are connected and managed by using a combination of Entra ID and Jamf.

Which two supported sources for identity are appropriate for this environment? (Choose two.)

A.

Captive portal

B.

User-ID agents configured for WMI client probing

C.

GlobalProtect with an internal gateway deployment

D.

Cloud Identity Engine synchronized with Entra ID

Full Access
Question # 11

In addition to Advanced DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions utilize inline machine learning (ML)? (Choose three)

A.

Enterprise DLP

B.

Advanced URL Filtering

C.

Advanced WildFire

D.

Advanced Threat Prevention

E.

IoT Security

Full Access
Question # 12

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Full Access
Question # 13

A customer claims that Advanced WildFire miscategorized a file as malicious and wants proof, because another vendor has said that the file is benign.

How could the systems engineer assure the customer that Advanced WildFire was accurate?

A.

Review the threat logs for information to provide to the customer.

B.

Use the WildFire Analysis Report in the log to show the customer the malicious actions the file took when it was detonated.

C.

Open a TAG ticket for the customer and allow support engineers to determine the appropriate action.

D.

Do nothing because the customer will realize Advanced WildFire is right.

Full Access
Question # 14

What is the minimum configuration to stop a Cobalt Strike Malleable C2 attack inline and in real time?

A.

Next-Generation CASB on PAN-OS 10.1

B.

Advanced Threat Prevention and PAN-OS 10.2

C.

Threat Prevention and Advanced WildFire with PAN-OS 10.0

D.

DNS Security, Threat Prevention, and Advanced WildFire with PAN-OS 9.x

Full Access
Question # 15

Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)

A.

PAN-CN-NGFW-CONFIG

B.

PAN-CN-MGMT-CONFIGMAP

C.

PAN-CN-MGMT

D.

PAN-CNI-MULTUS

Full Access
Question # 16

A systems engineer (SE) has joined a team to work with a managed security services provider (MSSP) that is evaluating PAN-OS for edge connections to their customer base. The MSSP is concerned about how to efficiently handle routing with all of its customers, especially how to handle BGP peering, because it has created a standard set of rules and settings that it wants to apply to each customer, as well as to maintain and update them. The solution requires logically separated BGP peering setups for each customer. What should the SE do to increase the probability of Palo Alto Networks being awarded the deal?

A.

Work with the MSSP to plan for the enabling of logical routers in the PAN-OS Advanced Routing Engine to allow sharing of routing profiles across the logical routers.

B.

Collaborate with the MSSP to create an API call with a standard set of routing filters, maps, and related actions, then the MSSP can call the API whenever they bring on a new customer.

C.

Confirm to the MSSP that the existing virtual routers will allow them to have logically separated BGP peering setups, but that there is no method to handle the standard criteria across all of the routers.

D.

Establish with the MSSP the use of vsys as the better way to segregate their environment so that customer data does not intermingle.

Full Access
Question # 17

Which three tools can a prospective customer use to evaluate Palo Alto Networks products to assess where they will fit in the existing architecture? (Choose three)

A.

Proof of Concept (POC)

B.

Policy Optimizer

C.

Security Lifecycle Review (SLR)

D.

Ultimate Test Drive

E.

Expedition

Full Access
Question # 18

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?

A.

Best Practice Assessment (BPA)

B.

Security Lifecycle Review (SLR)

C.

Firewall Sizing Guide

D.

Golden Images

Full Access