Pre-Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Paloalto Networks > PSE-Strata Professional > PSE-Strata-Pro-24

PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Question and Answers

Question # 4

Regarding APIs, a customer RFP states: "The vendor’s firewall solution must provide an API with an enforcement mechanism to deactivate API keys after two hours." How should the response address this clause?

A.

Yes - This is the default setting for API keys.

B.

No - The PAN-OS XML API does not support keys.

C.

No - The API keys can be made, but there is no method to deactivate them based on time.

D.

Yes - The default setting must be changed from no limit to 120 minutes.

Full Access
Question # 5

While responding to a customer RFP, a systems engineer (SE) is presented the question, "How do PANW firewalls enable the mapping of transactions as part of Zero Trust principles?" Which two narratives can the SE use to respond to the question? (Choose two.)

A.

Emphasize Zero Trust as an ideology, and that the customer decides how to align to Zero Trust principles.

B.

Reinforce the importance of decryption and security protections to verify traffic that is not malicious.

C.

Explain how the NGFW can be placed in the network so it has visibility into every traffic flow.

D.

Describe how Palo Alto Networks NGFW Security policies are built by using users, applications, and data objects.

Full Access
Question # 6

A systems engineer (SE) successfully demonstrates NGFW managed by Strata Cloud Manager (SCM) to a company. In the resulting planning phase of the proof of value (POV), the CISO requests a test that shows how the security policies are either meeting, or are progressing toward meeting, industry standards such as Critical Security Controls (CSC), and how the company can verify that it is effectively utilizing the functionality purchased.

During the POV testing timeline, how should the SE verify that the POV will meet the CISO's request?

A.

Near the end, pull a Security Lifecycle Review (SLR) in the POV and create a report for the customer.

B.

At the beginning, work with the customer to create custom dashboards and reports for any information required, so reports can be pulled as needed by the customer.

C.

Near the end, the customer pulls information from these SCM dashboards: Best Practices, CDSS Adoption, and NGFW Feature Adoption.

D.

At the beginning, use PANhandler golden images that are designed to align to compliance and toturning on the features for the CDSS subscription being tested.

Full Access
Question # 7

What are two methods that a NGFW uses to determine if submitted credentials are valid corporate credentials? (Choose two.)

A.

Group mapping

B.

LDAP query

C.

Domain credential filter

D.

WMI client probing

Full Access
Question # 8

A systems engineer (SE) has joined a team to work with a managed security services provider (MSSP) that is evaluating PAN-OS for edge connections to their customer base. The MSSP is concerned about how to efficiently handle routing with all of its customers, especially how to handle BGP peering, because it has created a standard set of rules and settings that it wants to apply to each customer, as well as to maintain and update them. The solution requires logically separated BGP peering setups for each customer. What should the SE do to increase the probability of Palo Alto Networks being awarded the deal?

A.

Work with the MSSP to plan for the enabling of logical routers in the PAN-OS Advanced Routing Engine to allow sharing of routing profiles across the logical routers.

B.

Collaborate with the MSSP to create an API call with a standard set of routing filters, maps, and related actions, then the MSSP can call the API whenever they bring on a new customer.

C.

Confirm to the MSSP that the existing virtual routers will allow them to have logically separated BGP peering setups, but that there is no method to handle the standard criteria across all of the routers.

D.

Establish with the MSSP the use of vsys as the better way to segregate their environment so that customer data does not intermingle.

Full Access
Question # 9

In addition to Advanced DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions utilize inline machine learning (ML)? (Choose three)

A.

Enterprise DLP

B.

Advanced URL Filtering

C.

Advanced WildFire

D.

Advanced Threat Prevention

E.

IoT Security

Full Access
Question # 10

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?

A.

Best Practice Assessment (BPA)

B.

Security Lifecycle Review (SLR)

C.

Firewall Sizing Guide

D.

Golden Images

Full Access
Question # 11

Which three descriptions apply to a perimeter firewall? (Choose three.)

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Full Access
Question # 12

A large global company plans to acquire 500 NGFWs to replace its legacy firewalls and has a specific requirement for centralized logging and reporting capabilities.

What should a systems engineer recommend?

A.

Combine Panorama for firewall management with Palo Alto Networks' cloud-based Strata Logging Service to offer scalability for the company's logging and reporting infrastructure.

B.

Use Panorama for firewall management and to transfer logs from the 500 firewalls directly to a third-party SIEM for centralized logging and reporting.

C.

Highlight the efficiency of PAN-OS, which employs AI to automatically extract critical logs and generate daily executive reports, and confirm that the purchase of 500 NGFWs is sufficient.

D.

Deploy a pair of M-1000 log collectors in the customer data center, and route logs from all 500 firewalls to the log collectors for centralized logging and reporting.

Full Access
Question # 13

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparationfor the meeting read: "Customer is struggling with security as they move to cloud apps and remote users." What should the SE recommend to the team in preparation for the meeting?

A.

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

B.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

C.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

D.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Full Access
Question # 14

A prospective customer wants to validate an NGFW solution and seeks the advice of a systems engineer (SE) regarding a design to meet the following stated requirements:

"We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to 40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing."

Which hardware and architecture/design recommendations should the SE make?

A.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

B.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

C.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

D.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

Full Access
Question # 15

A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?

A.

Use the "Monitor > PDF Reports" node to schedule a weekly email of the Zero Trust report to the internal management team.

B.

Help the customer build reports that align to their Zero Trust plan in the "Monitor > Manage Custom Reports" tab.

C.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.

D.

Use the "ACC" tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.

Full Access
Question # 16

Which statement applies to the default configuration of a Palo Alto Networks NGFW?

A.

Security profiles are applied to all policies by default, eliminating implicit trust of any data traversing the firewall.

B.

The default policy action for intrazone traffic is deny, eliminating implicit trust within a security zone.

C.

The default policy action allows all traffic unless explicitly denied.

D.

The default policy action for interzone traffic is deny, eliminating implicit trust between security zones.

Full Access
Question # 17

A security engineer has been tasked with protecting a company's on-premises web servers but is not authorized to purchase a web application firewall (WAF).

Which Palo Alto Networks solution will protect the company from SQL injection zero-day, command injection zero-day, Cross-Site Scripting (XSS) attacks, and IIS exploits?

A.

Threat Prevention and PAN-OS 11.x

B.

Advanced Threat Prevention and PAN-OS 11.x

C.

Threat Prevention, Advanced URL Filtering, and PAN-OS 10.2 (and higher)

D.

Advanced WildFire and PAN-OS 10.0 (and higher)

Full Access
Question # 18

What are three valid Panorama deployment options? (Choose three.)

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)

Full Access