Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Paloalto Networks PSE-Strata-Pro-24 Dumps

Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Question 1

An existing customer wants to expand their online business into physical stores for the first time. The customer requires NGFWs at the physical store to handle SD-WAN, security, and data protection needs, while also mandating a vendor-validated deployment method. Which two steps are valid actions for a systems engineer to take? (Choose two.)

Options:

A.

Recommend the customer purchase Palo Alto Networks or partner-provided professional services to meet the stated requirements.

B.

Use Golden Images and Day 1 configuration to create a consistent baseline from which thecustomer can efficiently work.

C.

Create a bespoke deployment plan with the customer that reviews their cloud architecture, store footprint, and security requirements.

D.

Use the reference architecture "On-Premises Network Security for the Branch Deployment Guide" to achieve a desired architecture.

Question 2

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?

Options:

A.

Advanced URL Filtering uses machine learning (ML) to learn which malicious URLs are being utilized by the attackers, then block the resulting traffic.

B.

Advanced Threat Prevention's command injection and SQL injection functions use inline deep learning against zero-day threats.

C.

Single Pass Architecture and parallel processing ensure traffic is efficiently scanned against any enabled Cloud-Delivered Security Services (CDSS) subscription.

D.

WildFire loads custom OS images to ensure that the sandboxing catches any activity that would affect the customer's environment.

Question 3

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

Options:

A.

GlobalProtect with multiple authentication profiles for each SAML IdP

B.

Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways

C.

Authentication sequence that has multiple authentication profiles using different authentication methods

D.

Multiple Cloud Identity Engine tenants for each business unit

Question 4

In which two locations can a Best Practice Assessment (BPA) report be generated for review by a customer? (Choose two.)

Options:

A.

PANW Partner Portal

B.

Customer Support Portal

C.

AIOps

D.

Strata Cloud Manager (SCM)

Question 5

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.

Which subscription(s) should the systems engineer recommend?

Options:

A.

Threat Prevention

B.

App-ID and Data Loss Prevention

C.

DNS Security

D.

Advanced Threat Prevention and Advanced URL Filtering

Question 6

What are two methods that a NGFW uses to determine if submitted credentials are valid corporate credentials? (Choose two.)

Options:

A.

Group mapping

B.

LDAP query

C.

Domain credential filter

D.

WMI client probing

Question 7

While responding to a customer RFP, a systems engineer (SE) is presented the question, "How do PANW firewalls enable the mapping of transactions as part of Zero Trust principles?" Which two narratives can the SE use to respond to the question? (Choose two.)

Options:

A.

Emphasize Zero Trust as an ideology, and that the customer decides how to align to Zero Trust principles.

B.

Reinforce the importance of decryption and security protections to verify traffic that is not malicious.

C.

Explain how the NGFW can be placed in the network so it has visibility into every traffic flow.

D.

Describe how Palo Alto Networks NGFW Security policies are built by using users, applications, and data objects.

Question 8

A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?

Options:

A.

Use the "Monitor > PDF Reports" node to schedule a weekly email of the Zero Trust report to the internal management team.

B.

Help the customer build reports that align to their Zero Trust plan in the "Monitor > Manage Custom Reports" tab.

C.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.

D.

Use the "ACC" tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.

Question 9

Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer's business when they show interest in adopting Zero Trust? (Choose two.)

Options:

A.

Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure.

B.

Explain how Palo Alto Networks can place virtual NGFWs across the customer's network to ensure assets and traffic are seen and controlled.

C.

Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust.

D.

Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase.

Question 10

What are three valid Panorama deployment options? (Choose three.)

Options:

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)

Question 11

What are the first two steps a customer should perform as they begin to understand and adopt Zero Trust principles? (Choose two)

Options:

A.

Understand which users, devices, infrastructure, applications, data, and services are part of the network or have access to it.

B.

Enable relevant Cloud-Delivered Security Services (CDSS) subscriptions to automatically protect the customer's environment from both internal and external threats.

C.

Map the transactions between users, applications, and data, then verify and inspect those transactions.

D.

Implement VM-Series NGFWs in the customer’s public and private clouds to protect east-west traffic.

Question 12

Which action can help alleviate a prospective customer's concerns about transitioning from a legacy firewall with port-based policies to a Palo Alto Networks NGFW with application-based policies?

Options:

A.

Discuss the PAN-OS Policy Optimizer feature as a means to safely migrate port-based rules to application-based rules.

B.

Assure the customer that the migration wizard will automatically convert port-based rules to application-based rules upon installation of the new NGFW.

C.

Recommend deploying a new NGFW firewall alongside the customer's existing port-based firewall until they are comfortable removing the port-based firewall.

D.

Reassure the customer that the NGFW supports the continued use of port-based rules, as PAN-OS automatically translates these policies into application-based policies.

Question 13

Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)

Options:

A.

Payment Card Industry (PCI)

B.

National Institute of Standards and Technology (NIST)

C.

Center for Internet Security (CIS)

D.

Health Insurance Portability and Accountability Act (HIPAA)

Question 14

There are no Advanced Threat Prevention log events in a company's SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.

Which action should the systems administrator take next?

Options:

A.

Enable the company's Threat Prevention license.

B.

Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company's SIEM instance.

C.

Have the SIEM vendor troubleshoot its software.

D.

Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.

Question 15

A prospective customer has provided specific requirements for an upcoming firewall purchase, including the need to process a minimum of 200,000 connections per second while maintaining at least 15 Gbps of throughput with App-ID and Threat Prevention enabled.

What should a systems engineer do to determine the most suitable firewall for the customer?

Options:

A.

Upload 30 days of customer firewall traffic logs to the firewall calculator tool on the Palo Alto Networks support portal.

B.

Download the firewall sizing tool from the Palo Alto Networks support portal.

C.

Use the online product configurator tool provided on the Palo Alto Networks website.

D.

Use the product selector tool available on the Palo Alto Networks website.

Question 16

Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)

Options:

A.

XML API

B.

Captive portal

C.

User-ID

D.

SCP log ingestion

Question 17

Which three descriptions apply to a perimeter firewall? (Choose three.)

Options:

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Question 18

With Strata Cloud Manager (SCM) or Panorama, customers can monitor and manage which three solutions? (Choose three.)

Options:

A.

Prisma Access

B.

Prisma Cloud

C.

Cortex XSIAM

D.

NGFW

E.

Prisma SD-WAN

Page: 1 / 6
Total 60 questions