Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Exam Practice Test

Page: 1 / 6
Total 60 questions

Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Question 1

In addition to Advanced DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions utilize inline machine learning (ML)? (Choose three)

Options:

A.

Enterprise DLP

B.

Advanced URL Filtering

C.

Advanced WildFire

D.

Advanced Threat Prevention

E.

IoT Security

Question 2

A customer asks a systems engineer (SE) how Palo Alto Networks can claim it does not lose throughput performance as more Cloud-Delivered Security Services (CDSS) subscriptions are enabled on the firewall.

Which two concepts should the SE explain to address the customer's concern? (Choose two.)

Options:

A.

Parallel Processing

B.

Advanced Routing Engine

C.

Single Pass Architecture

D.

Management Data Plane Separation

Question 3

Which three tools can a prospective customer use to evaluate Palo Alto Networks products to assess where they will fit in the existing architecture? (Choose three)

Options:

A.

Proof of Concept (POC)

B.

Policy Optimizer

C.

Security Lifecycle Review (SLR)

D.

Ultimate Test Drive

E.

Expedition

Question 4

The PAN-OS User-ID integrated agent is included with PAN-OS software and comes in which two forms? (Choose two.)

Options:

A.

Integrated agent

B.

GlobalProtect agent

C.

Windows-based agent

D.

Cloud Identity Engine (CIE)

Question 5

A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?

Options:

A.

Use the "Monitor > PDF Reports" node to schedule a weekly email of the Zero Trust report to the internal management team.

B.

Help the customer build reports that align to their Zero Trust plan in the "Monitor > Manage Custom Reports" tab.

C.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.

D.

Use the "ACC" tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.

Question 6

What does Policy Optimizer allow a systems engineer to do for an NGFW?

Options:

A.

Recommend best practices on new policy creation

B.

Show unused licenses for Cloud-Delivered Security Services (CDSS) subscriptions and firewalls

C.

Identify Security policy rules with unused applications

D.

Act as a migration tool to import policies from third-party vendors

Question 7

A systems engineer (SE) is working with a customer that is fully cloud-deployed for all applications. The customer is interested in Palo Alto Networks NGFWs but describes the following challenges:

"Our apps are in AWS and Azure, with whom we have contracts and minimum-revenue guarantees. We would use the built-in firewall on the cloud service providers (CSPs), but the need for centralized policy management to reduce human error is more important."

Which recommendations should the SE make?

Options:

A.

Cloud NGFWs at both CSPs; provide the customer a license for a Panorama virtual appliance from their CSP's marketplace of choice to centrally manage the systems.

B.

Cloud NGFWs in AWS and VM-Series firewall in Azure; the customer selects a PAYG licensing Panorama deployment in their CSP of choice.

C.

VM-Series firewalls in both CSPs; manually built Panorama in the CSP of choice on a host of either type: Palo Alto Networks provides a license.

D.

VM-Series firewall and CN-Series firewall in both CSPs; provide the customer a private-offer Panorama virtual appliance from their CSP’s marketplace of choice to centrally manage the systems.

Question 8

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.

Which subscription(s) should the systems engineer recommend?

Options:

A.

Threat Prevention

B.

App-ID and Data Loss Prevention

C.

DNS Security

D.

Advanced Threat Prevention and Advanced URL Filtering

Question 9

An existing customer wants to expand their online business into physical stores for the first time. The customer requires NGFWs at the physical store to handle SD-WAN, security, and data protection needs, while also mandating a vendor-validated deployment method. Which two steps are valid actions for a systems engineer to take? (Choose two.)

Options:

A.

Recommend the customer purchase Palo Alto Networks or partner-provided professional services to meet the stated requirements.

B.

Use Golden Images and Day 1 configuration to create a consistent baseline from which thecustomer can efficiently work.

C.

Create a bespoke deployment plan with the customer that reviews their cloud architecture, store footprint, and security requirements.

D.

Use the reference architecture "On-Premises Network Security for the Branch Deployment Guide" to achieve a desired architecture.

Question 10

In which two locations can a Best Practice Assessment (BPA) report be generated for review by a customer? (Choose two.)

Options:

A.

PANW Partner Portal

B.

Customer Support Portal

C.

AIOps

D.

Strata Cloud Manager (SCM)

Question 11

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?

Options:

A.

It cannot be addressed because PAN-OS does not support it.

B.

It can be addressed by creating multiple eBGP autonomous systems.

C.

It can be addressed with BGP confederations.

D.

It cannot be addressed because BGP must be fully meshed internally to work.

Question 12

A systems engineer should create a profile that blocks which category to protect a customer from ransomware URLs by using Advanced URL Filtering?

Options:

A.

Ransomware

B.

High Risk

C.

Scanning Activity

D.

Command and Control

Question 13

Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)

Options:

A.

PAN-CN-NGFW-CONFIG

B.

PAN-CN-MGMT-CONFIGMAP

C.

PAN-CN-MGMT

D.

PAN-CNI-MULTUS

Question 14

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

Options:

A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Question 15

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?

Options:

A.

Advanced URL Filtering uses machine learning (ML) to learn which malicious URLs are being utilized by the attackers, then block the resulting traffic.

B.

Advanced Threat Prevention's command injection and SQL injection functions use inline deep learning against zero-day threats.

C.

Single Pass Architecture and parallel processing ensure traffic is efficiently scanned against any enabled Cloud-Delivered Security Services (CDSS) subscription.

D.

WildFire loads custom OS images to ensure that the sandboxing catches any activity that would affect the customer's environment.

Question 16

What is used to stop a DNS-based threat?

Options:

A.

DNS proxy

B.

Buffer overflow protection

C.

DNS tunneling

D.

DNS sinkholing

Question 17

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

Options:

A.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

B.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

C.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

D.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Question 18

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

Options:

A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Page: 1 / 6
Total 60 questions