Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Paloalto Networks PSE-Strata-Pro-24 Dumps Questions Answers

Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Question 1

Which statement appropriately describes performance tuning Intrusion Prevention System (IPS) functions on a Palo Alto Networks NGFW running Advanced Threat Prevention?

Options:

A.

Leave all signatures turned on because they do not impact performance.

B.

Create a new threat profile to use only signatures needed for the environment.

C.

Work with TAC to run a debug and receive exact measurements of performance utilization for the IPS.

D.

To increase performance, disable any threat signatures that do not apply to the environment.

Buy Now
Question 2

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

Options:

A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Question 3

What is used to stop a DNS-based threat?

Options:

A.

DNS proxy

B.

Buffer overflow protection

C.

DNS tunneling

D.

DNS sinkholing

Question 4

Which three use cases are specific to Policy Optimizer? (Choose three.)

Options:

A.

Discovering applications on the network and transitions to application-based policy over time

B.

Converting broad rules based on application filters into narrow rules based on application groups

C.

Enabling migration from port-based rules to application-based rules

D.

Discovering 5-tuple attributes that can be simplified to 4-tuple attributes

E.

Automating the tagging of rules based on historical log data

Question 5

Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)

Options:

A.

Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.

B.

Apply decryption where possible to inspect and log all new and existing traffic flows.

C.

Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.

D.

Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.

Question 6

A customer asks a systems engineer (SE) how Palo Alto Networks can claim it does not lose throughput performance as more Cloud-Delivered Security Services (CDSS) subscriptions are enabled on the firewall.

Which two concepts should the SE explain to address the customer's concern? (Choose two.)

Options:

A.

Parallel Processing

B.

Advanced Routing Engine

C.

Single Pass Architecture

D.

Management Data Plane Separation

Question 7

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?

Options:

A.

It cannot be addressed because PAN-OS does not support it.

B.

It can be addressed by creating multiple eBGP autonomous systems.

C.

It can be addressed with BGP confederations.

D.

It cannot be addressed because BGP must be fully meshed internally to work.

Question 8

Regarding APIs, a customer RFP states: "The vendor’s firewall solution must provide an API with an enforcement mechanism to deactivate API keys after two hours." How should the response address this clause?

Options:

A.

Yes - This is the default setting for API keys.

B.

No - The PAN-OS XML API does not support keys.

C.

No - The API keys can be made, but there is no method to deactivate them based on time.

D.

Yes - The default setting must be changed from no limit to 120 minutes.

Question 9

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

Options:

A.

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.

B.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.

C.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.

D.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.

Question 10

In addition to Advanced DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions utilize inline machine learning (ML)? (Choose three)

Options:

A.

Enterprise DLP

B.

Advanced URL Filtering

C.

Advanced WildFire

D.

Advanced Threat Prevention

E.

IoT Security

Question 11

Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)

Options:

A.

Payment Card Industry (PCI)

B.

National Institute of Standards and Technology (NIST)

C.

Center for Internet Security (CIS)

D.

Health Insurance Portability and Accountability Act (HIPAA)

Question 12

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

Options:

A.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

B.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

C.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

D.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Question 13

A systems engineer (SE) has joined a team to work with a managed security services provider (MSSP) that is evaluating PAN-OS for edge connections to their customer base. The MSSP is concerned about how to efficiently handle routing with all of its customers, especially how to handle BGP peering, because it has created a standard set of rules and settings that it wants to apply to each customer, as well as to maintain and update them. The solution requires logically separated BGP peering setups for each customer. What should the SE do to increase the probability of Palo Alto Networks being awarded the deal?

Options:

A.

Work with the MSSP to plan for the enabling of logical routers in the PAN-OS Advanced Routing Engine to allow sharing of routing profiles across the logical routers.

B.

Collaborate with the MSSP to create an API call with a standard set of routing filters, maps, and related actions, then the MSSP can call the API whenever they bring on a new customer.

C.

Confirm to the MSSP that the existing virtual routers will allow them to have logically separated BGP peering setups, but that there is no method to handle the standard criteria across all of the routers.

D.

Establish with the MSSP the use of vsys as the better way to segregate their environment so that customer data does not intermingle.

Question 14

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

Options:

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.

Question 15

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

Options:

A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Question 16

Which two products can be integrated and managed by Strata Cloud Manager (SCM)? (Choose two)

Options:

A.

Prisma SD-WAN

B.

Prisma Cloud

C.

Cortex XDR

D.

VM-Series NGFW

Question 17

A customer sees unusually high DNS traffic to an unfamiliar IP address. Which Palo Alto Networks Cloud-Delivered Security Services (CDSS) subscription should be enabled to further inspect this traffic?

Options:

A.

Advanced Threat Prevention

B.

Advanced WildFire

C.

Advanced URL Filtering

D.

Advanced DNS Security

Question 18

What are three valid Panorama deployment options? (Choose three.)

Options:

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)