Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Exam Practice Test

Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: "Customer is struggling with security as they move to cloud apps and remote users." What should the SE recommend to the team in preparation for the meeting?

Options:

A.

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

B.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

C.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

D.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Question 2

Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?

Options:

A.

Use DNS Security to limit access to file-sharing applications based on job functions.

B.

Use App-ID to limit access to file-sharing applications based on job functions.

C.

Use DNS Security to block all file-sharing applications and uploading abilities.

D.

Use App-ID to block all file-sharing applications and uploading abilities.

Question 3

While responding to a customer RFP, a systems engineer (SE) is presented the question, "How do PANW firewalls enable the mapping of transactions as part of Zero Trust principles?" Which two narratives can the SE use to respond to the question? (Choose two.)

Options:

A.

Emphasize Zero Trust as an ideology, and that the customer decides how to align to Zero Trust principles.

B.

Reinforce the importance of decryption and security protections to verify traffic that is not malicious.

C.

Explain how the NGFW can be placed in the network so it has visibility into every traffic flow.

D.

Describe how Palo Alto Networks NGFW Security policies are built by using users, applications, and data objects.

Question 4

Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)

Options:

A.

Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.

B.

Apply decryption where possible to inspect and log all new and existing traffic flows.

C.

Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.

D.

Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.

Question 5

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?

Options:

A.

Best Practice Assessment (BPA)

B.

Security Lifecycle Review (SLR)

C.

Firewall Sizing Guide

D.

Golden Images

Question 6

What is the minimum configuration to stop a Cobalt Strike Malleable C2 attack inline and in real time?

Options:

A.

Next-Generation CASB on PAN-OS 10.1

B.

Advanced Threat Prevention and PAN-OS 10.2

C.

Threat Prevention and Advanced WildFire with PAN-OS 10.0

D.

DNS Security, Threat Prevention, and Advanced WildFire with PAN-OS 9.x

Question 7

Which statement appropriately describes performance tuning Intrusion Prevention System (IPS) functions on a Palo Alto Networks NGFW running Advanced Threat Prevention?

Options:

A.

Leave all signatures turned on because they do not impact performance.

B.

Create a new threat profile to use only signatures needed for the environment.

C.

Work with TAC to run a debug and receive exact measurements of performance utilization for the IPS.

D.

To increase performance, disable any threat signatures that do not apply to the environment.

Question 8

Which three use cases are specific to Policy Optimizer? (Choose three.)

Options:

A.

Discovering applications on the network and transitions to application-based policy over time

B.

Converting broad rules based on application filters into narrow rules based on application groups

C.

Enabling migration from port-based rules to application-based rules

D.

Discovering 5-tuple attributes that can be simplified to 4-tuple attributes

E.

Automating the tagging of rules based on historical log data

Question 9

A customer asks a systems engineer (SE) how Palo Alto Networks can claim it does not lose throughput performance as more Cloud-Delivered Security Services (CDSS) subscriptions are enabled on the firewall.

Which two concepts should the SE explain to address the customer's concern? (Choose two.)

Options:

A.

Parallel Processing

B.

Advanced Routing Engine

C.

Single Pass Architecture

D.

Management Data Plane Separation

Question 10

A company with a large Active Directory (AD) of over 20,000 groups has user roles based on group membership in the directory. Up to 1,000 groups may be used in Security policies. The company has limited operations personnel and wants to reduce the administrative overhead of managing the synchronization of the groups with their firewalls.

What is the recommended architecture to synchronize the company's AD with Palo Alto Networks firewalls?

Options:

A.

Configure a group mapping profile with custom filters for LDAP attributes that are mapped to the user roles.

B.

Configure a group mapping profile, without a filter, to synchronize all groups.

C.

Configure a group mapping profile with an include group list.

D.

Configure NGFWs to synchronize with the AD after deploying the Cloud Identity Engine (CIE) and agents.

Question 11

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?

Options:

A.

Advanced URL Filtering uses machine learning (ML) to learn which malicious URLs are being utilized by the attackers, then block the resulting traffic.

B.

Advanced Threat Prevention's command injection and SQL injection functions use inline deep learning against zero-day threats.

C.

Single Pass Architecture and parallel processing ensure traffic is efficiently scanned against any enabled Cloud-Delivered Security Services (CDSS) subscription.

D.

WildFire loads custom OS images to ensure that the sandboxing catches any activity that would affect the customer's environment.

Question 12

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?

Options:

A.

It cannot be addressed because PAN-OS does not support it.

B.

It can be addressed by creating multiple eBGP autonomous systems.

C.

It can be addressed with BGP confederations.

D.

It cannot be addressed because BGP must be fully meshed internally to work.

Question 13

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

Options:

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.

Question 14

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

Options:

A.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

B.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

C.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

D.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Question 15

Device-ID can be used in which three policies? (Choose three.)

Options:

A.

Security

B.

Decryption

C.

Policy-based forwarding (PBF)

D.

SD-WAN

E.

Quality of Service (QoS)

Question 16

A systems engineer (SE) successfully demonstrates NGFW managed by Strata Cloud Manager (SCM) to a company. In the resulting planning phase of the proof of value (POV), the CISO requests a test that shows how the security policies are either meeting, or are progressing toward meeting, industry standards such as Critical Security Controls (CSC), and how the company can verify that it is effectively utilizing the functionality purchased.

During the POV testing timeline, how should the SE verify that the POV will meet the CISO's request?

Options:

A.

Near the end, pull a Security Lifecycle Review (SLR) in the POV and create a report for the customer.

B.

At the beginning, work with the customer to create custom dashboards and reports for any information required, so reports can be pulled as needed by the customer.

C.

Near the end, the customer pulls information from these SCM dashboards: Best Practices, CDSS Adoption, and NGFW Feature Adoption.

D.

At the beginning, use PANhandler golden images that are designed to align to compliance and to turning on the features for the CDSS subscription being tested.

Question 17

Which two statements clarify the functionality and purchase options for Palo Alto Networks AIOps for NGFW? (Choose two.)

Options:

A.

It is offered in two license tiers: a commercial edition and an enterprise edition.

B.

It is offered in two license tiers: a free version and a premium version.

C.

It uses telemetry data to forecast, preempt, or identify issues, and it uses machine learning (ML) to adjust and enhance the process.

D.

It forwards log data to Advanced WildFire to anticipate, prevent, or identify issues, and it uses machine learning (ML) to refine and adapt to the process.

Question 18

In which two locations can a Best Practice Assessment (BPA) report be generated for review by a customer? (Choose two.)

Options:

A.

PANW Partner Portal

B.

Customer Support Portal

C.

AIOps

D.

Strata Cloud Manager (SCM)