Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Paloalto Networks PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Exam Practice Test

Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Question 1

Regarding APIs, a customer RFP states: "The vendor’s firewall solution must provide an API with an enforcement mechanism to deactivate API keys after two hours." How should the response address this clause?

Options:

A.

Yes - This is the default setting for API keys.

B.

No - The PAN-OS XML API does not support keys.

C.

No - The API keys can be made, but there is no method to deactivate them based on time.

D.

Yes - The default setting must be changed from no limit to 120 minutes.

Question 2

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

Options:

A.

GlobalProtect with multiple authentication profiles for each SAML IdP

B.

Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways

C.

Authentication sequence that has multiple authentication profiles using different authentication methods

D.

Multiple Cloud Identity Engine tenants for each business unit

Question 3

What is used to stop a DNS-based threat?

Options:

A.

DNS proxy

B.

Buffer overflow protection

C.

DNS tunneling

D.

DNS sinkholing

Question 4

A customer sees unusually high DNS traffic to an unfamiliar IP address. Which Palo Alto Networks Cloud-Delivered Security Services (CDSS) subscription should be enabled to further inspect this traffic?

Options:

A.

Advanced Threat Prevention

B.

Advanced WildFire

C.

Advanced URL Filtering

D.

Advanced DNS Security

Question 5

Device-ID can be used in which three policies? (Choose three.)

Options:

A.

Security

B.

Decryption

C.

Policy-based forwarding (PBF)

D.

SD-WAN

E.

Quality of Service (QoS)

Question 6

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?

Options:

A.

It cannot be addressed because PAN-OS does not support it.

B.

It can be addressed by creating multiple eBGP autonomous systems.

C.

It can be addressed with BGP confederations.

D.

It cannot be addressed because BGP must be fully meshed internally to work.

Question 7

While responding to a customer RFP, a systems engineer (SE) is presented the question, "How do PANW firewalls enable the mapping of transactions as part of Zero Trust principles?" Which two narratives can the SE use to respond to the question? (Choose two.)

Options:

A.

Emphasize Zero Trust as an ideology, and that the customer decides how to align to Zero Trust principles.

B.

Reinforce the importance of decryption and security protections to verify traffic that is not malicious.

C.

Explain how the NGFW can be placed in the network so it has visibility into every traffic flow.

D.

Describe how Palo Alto Networks NGFW Security policies are built by using users, applications, and data objects.

Question 8

Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?

Options:

A.

Use DNS Security to limit access to file-sharing applications based on job functions.

B.

Use App-ID to limit access to file-sharing applications based on job functions.

C.

Use DNS Security to block all file-sharing applications and uploading abilities.

D.

Use App-ID to block all file-sharing applications and uploading abilities.

Question 9

A systems engineer should create a profile that blocks which category to protect a customer from ransomware URLs by using Advanced URL Filtering?

Options:

A.

Ransomware

B.

High Risk

C.

Scanning Activity

D.

Command and Control

Question 10

Which three descriptions apply to a perimeter firewall? (Choose three.)

Options:

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Question 11

A systems engineer (SE) successfully demonstrates NGFW managed by Strata Cloud Manager (SCM) to a company. In the resulting planning phase of the proof of value (POV), the CISO requests a test that shows how the security policies are either meeting, or are progressing toward meeting, industry standards such as Critical Security Controls (CSC), and how the company can verify that it is effectively utilizing the functionality purchased.

During the POV testing timeline, how should the SE verify that the POV will meet the CISO's request?

Options:

A.

Near the end, pull a Security Lifecycle Review (SLR) in the POV and create a report for the customer.

B.

At the beginning, work with the customer to create custom dashboards and reports for any information required, so reports can be pulled as needed by the customer.

C.

Near the end, the customer pulls information from these SCM dashboards: Best Practices, CDSS Adoption, and NGFW Feature Adoption.

D.

At the beginning, use PANhandler golden images that are designed to align to compliance and to turning on the features for the CDSS subscription being tested.

Question 12

Which three use cases are specific to Policy Optimizer? (Choose three.)

Options:

A.

Discovering applications on the network and transitions to application-based policy over time

B.

Converting broad rules based on application filters into narrow rules based on application groups

C.

Enabling migration from port-based rules to application-based rules

D.

Discovering 5-tuple attributes that can be simplified to 4-tuple attributes

E.

Automating the tagging of rules based on historical log data

Question 13

While a quote is being finalized for a customer that is purchasing multiple PA-5400 series firewalls, the customer specifies the need for protection against zero-day malware attacks.

Which Cloud-Delivered Security Services (CDSS) subscription add-on license should be included in the quote?

Options:

A.

AI Access Security

B.

Advanced Threat Prevention

C.

Advanced WildFire

D.

App-ID

Question 14

With Strata Cloud Manager (SCM) or Panorama, customers can monitor and manage which three solutions? (Choose three.)

Options:

A.

Prisma Access

B.

Prisma Cloud

C.

Cortex XSIAM

D.

NGFW

E.

Prisma SD-WAN

Question 15

What are three valid Panorama deployment options? (Choose three.)

Options:

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)

Question 16

Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)

Options:

A.

Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.

B.

Apply decryption where possible to inspect and log all new and existing traffic flows.

C.

Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.

D.

Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.

Question 17

In addition to DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions are minimum recommendations for all NGFWs that handle north-south traffic? (Choose three)

Options:

A.

SaaS Security

B.

Advanced WildFire

C.

Enterprise DLP

D.

Advanced Threat Prevention

E.

Advanced URL Filtering

Question 18

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

Options:

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.