ExamGecko
Home / Palo Alto Networks / PSE-Strata-Pro-24 / List of questions
Ask Question

Palo Alto Networks PSE-Strata-Pro-24 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)

PAN-CN-NGFW-CONFIG

PAN-CN-NGFW-CONFIG

PAN-CN-MGMT-CONFIGMAP

PAN-CN-MGMT-CONFIGMAP

PAN-CN-MGMT

PAN-CN-MGMT

PAN-CNI-MULTUS

PAN-CNI-MULTUS

Suggested answer: A, B
Explanation:

CN-Series firewalls are Palo Alto Networks' containerized NGFWs designed for protecting Kubernetes environments. These firewalls provide threat prevention, traffic inspection, and compliance enforcement within containerized workloads. Deploying CN-Series in a Kubernetes cluster requires specific configuration files to set up the management plane and NGFW functionalities.

Option A (Correct): PAN-CN-NGFW-CONFIG is required to define the configurations for the NGFW itself. This file contains firewall policies, application configurations, and security profiles needed to secure the Kubernetes environment.

Option B (Correct): PAN-CN-MGMT-CONFIGMAP is a ConfigMap file that contains the configuration for the management plane of the CN-Series firewall. It helps set up the connection between the management interface and the NGFW deployed within the Kubernetes cluster.

Option C: This option does not represent a valid or required file for deploying CN-Series firewalls. The management configurations are handled via the ConfigMap.

Option D: PAN-CNI-MULTUS refers to the Multus CNI plugin for Kubernetes, which is used for enabling multiple network interfaces in pods. While relevant for Kubernetes networking, it is not specific to deploying CN-Series firewalls.

CN-Series Deployment Guide: https://docs.paloaltonetworks.com/cn-series

Kubernetes Integration with CN-Series Firewalls: https://www.paloaltonetworks.com

asked 14/02/2025
Mathijs Sijm
30 questions

Question 22

Report Export Collapse

A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?

Use the 'Monitor > PDF Reports' node to schedule a weekly email of the Zero Trust report to the internal management team.

Use the 'Monitor > PDF Reports' node to schedule a weekly email of the Zero Trust report to the internal management team.

Help the customer build reports that align to their Zero Trust plan in the 'Monitor > Manage Custom Reports' tab.

Help the customer build reports that align to their Zero Trust plan in the 'Monitor > Manage Custom Reports' tab.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.

Use the 'ACC' tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.

Use the 'ACC' tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.

Suggested answer: B
Explanation:

To demonstrate compliance with Zero Trust principles, a systems engineer can leverage the rich reporting and logging capabilities of Palo Alto Networks firewalls. The focus should be on creating reports that align with the customer's Zero Trust strategy, providing detailed insights into policy enforcement, user activity, and application usage.

Option A: Scheduling a pre-built PDF report does not offer the flexibility to align the report with the customer's specific Zero Trust plan. While useful for automated reporting, this option is too generic for demonstrating Zero Trust compliance.

Option B (Correct): Custom reports in the 'Monitor > Manage Custom Reports' tab allow the customer to build tailored reports that align with their Zero Trust plan. These reports can include granular details such as application usage, user activity, policy enforcement logs, and segmentation compliance. This approach ensures the customer can present evidence directly related to their Zero Trust implementation.

Option C: Using a third-party tool is unnecessary as Palo Alto Networks NGFWs already have built-in capabilities to log, report, and demonstrate policy enforcement. This option adds complexity and may not fully leverage the native capabilities of the NGFW.

Option D: The Application Command Center (ACC) is useful for visualizing traffic and historical data but is not a reporting tool. While it can complement custom reports, it is not a substitute for generating Zero Trust-specific compliance reports.

Managing Reports in PAN-OS: https://docs.paloaltonetworks.com

Zero Trust Monitoring and Reporting Best Practices: https://www.paloaltonetworks.com/zero-trust

asked 14/02/2025
Faizan Ahmed
45 questions

Question 23

Report Export Collapse

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.

Suggested answer: A
Explanation:

When high traffic from Palo Alto Networks NGFWs to Active Directory servers causes performance issues, optimizing the way NGFWs gather user-to-IP mappings is critical. Palo Alto Networks offers multiple ways to collect user identity information, and Cloud Identity Engine provides a solution that reduces the load on AD servers while still ensuring efficient and accurate mapping.

Option A (Correct): Cloud Identity Engine allows NGFWs to gather user-to-IP mappings directly from Active Directory authentication logs or other identity sources without placing heavy traffic on the AD servers. By leveraging this feature, the NGFW can offload authentication-related tasks and efficiently identify users without overloading AD servers. This solution is scalable and minimizes the overhead typically caused by frequent User-ID queries to AD servers.

Option B: Using GlobalProtect Windows SSO to gather user information can add complexity and is not the most efficient solution for this problem. It requires all users to install GlobalProtect agents, which may not be feasible in all environments and can introduce operational challenges.

Option C: Data redistribution involves redistributing user-to-IP mappings from one NGFW (hub) to other NGFWs (spokes). While this can reduce the number of queries sent to AD servers, it assumes the mappings are already being collected from AD servers by the hub, which means the performance issue on the AD servers would persist.

Option D: Using GlobalProtect agents to gather user information is a valid method for environments where GlobalProtect is already deployed, but it is not the most efficient or straightforward solution for the given problem. It also introduces dependencies on agent deployment, configuration, and management.

How to Implement Cloud Identity Engine for User-ID Mapping:

Enable Cloud Identity Engine from the Palo Alto Networks console.

Integrate the Cloud Identity Engine with the AD servers to allow it to retrieve authentication logs directly.

Configure the NGFWs to use the Cloud Identity Engine for User-ID mappings instead of querying the AD servers directly.

Monitor performance to ensure the AD servers are no longer overloaded, and mappings are being retrieved efficiently.

Cloud Identity Engine Overview: https://docs.paloaltonetworks.com/cloud-identity

User-ID Best Practices: https://docs.paloaltonetworks.com

asked 14/02/2025
Padmanabhan Kudiarasu
53 questions

Question 24

Report Export Collapse

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: 'Customer is struggling with security as they move to cloud apps and remote users.' What should the SE recommend to the team in preparation for the meeting?

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Suggested answer: B
Explanation:

When preparing for a customer meeting, it's important to understand their specific challenges and align solutions accordingly. The notes suggest that the customer is facing difficulties securing their cloud apps and remote users, which are core areas addressed by Palo Alto Networks' Zero Trust and SASE solutions. However, jumping directly into a pitch or product demonstration without validating the customer's specific challenges may fail to build trust or fully address their needs.

Option A: Leading with a pre-structured pitch about Zero Trust principles may not resonate with the customer if their challenges are not fully understood first. The team needs to gather insights into the customer's security pain points before presenting a solution.

Option B (Correct): Discovery questions are a critical step in the sales process, especially when addressing complex topics like Zero Trust. By designing targeted questions about the customer's challenges with identity, devices, data, and access, the SE can identify specific pain points. These insights can then be used to tailor a Zero Trust strategy that directly addresses the customer's concerns. This approach ensures the meeting is customer-focused and demonstrates that the SE understands their unique needs.

Option C: While a product demonstration of GlobalProtect, Prisma Access, and SaaS security is valuable, it should come after discovery. Presenting products prematurely may seem like a generic sales pitch and could fail to address the customer's actual challenges.

Option D: Prisma SASE is an excellent solution for addressing cloud security and remote user challenges, but recommending it without first understanding the customer's specific needs may undermine trust. This step should follow after discovery and validation of the customer's pain points.

Examples of Discovery Questions:

What are your primary security challenges with remote users and cloud applications?

Are you currently able to enforce consistent security policies across your hybrid environment?

How do you handle identity verification and access control for remote users?

What level of visibility do you have into traffic to and from your cloud applications?

Palo Alto Networks Zero Trust Overview: https://www.paloaltonetworks.com/zero-trust

Best Practices for Customer Discovery: https://docs.paloaltonetworks.com/sales-playbooks

asked 14/02/2025
Adekunle Fodeke
35 questions

Question 25

Report Export Collapse

A prospective customer wants to validate an NGFW solution and seeks the advice of a systems engineer (SE) regarding a design to meet the following stated requirements:

'We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to 40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing.'

Which hardware and architecture/design recommendations should the SE make?

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.

Suggested answer: A
Explanation:

The problem provides several constraints and design requirements that must be carefully considered:

Bandwidth Requirement:

The customer needs an NGFW capable of handling a total throughput of 72 Gbps.

The PA-5445 is specifically designed for high-throughput environments and supports up to 81.3 Gbps Threat Prevention throughput (as per the latest hardware performance specifications). This ensures the throughput needs are fully met with some room for growth.

Interface Compatibility:

The customer mentions that their core switches support up to 40 Gbps interfaces. The design must include aggregate links to meet the overall bandwidth while aligning with the 40 Gbps interface limitations.

The PA-5445 supports 40Gbps QSFP+ interfaces, making it a suitable option for the hardware requirement.

No Change to IP Address Structure:

Since the customer cannot modify their IP address structure, deploying the NGFW in Layer-2 or Virtual Wire mode is ideal.

Virtual Wire mode allows the firewall to inspect traffic transparently between two Layer-2 devices without modifying the existing IP structure. Similarly, Layer-2 mode allows the firewall to behave like a switch at Layer-2 while still applying security policies.

Threat Prevention, DNS, and Sandboxing Requirements:

The customer requires advanced security features like Threat Prevention and potentially sandboxing (WildFire). The PA-5445 is equipped to handle these functionalities with its dedicated hardware-based architecture for content inspection and processing.

Aggregate Interface Groups:

The architecture should include aggregate interface groups to distribute traffic across multiple physical interfaces to support the high throughput requirement.

By aggregating 2 x 40Gbps interfaces on both sides of the path in Virtual Wire or Layer-2 mode, the design ensures sufficient bandwidth (up to 80 Gbps per side).

Why PA-5445 in Layer-2 or Virtual Wire mode is the Best Option:

Option A satisfies all the customer's requirements:

The PA-5445 meets the 72 Gbps throughput requirement.

2 x 40 Gbps interfaces can be aggregated to handle traffic flow between the core switches and the NGFW.

Virtual Wire or Layer-2 mode preserves the IP address structure, while still allowing full threat prevention and DNS inspection capabilities.

The PA-5445 also supports sandboxing (WildFire) for advanced file-based threat detection.

Why Not Other Options:

Option B:

The PA-5430 is insufficient for the throughput requirement (72 Gbps). Its maximum Threat Prevention throughput is 60.3 Gbps, which does not provide the necessary capacity.

Option C:

While the PA-5445 is appropriate, deploying it in Layer-3 mode would require changes to the IP address structure, which the customer explicitly stated is not an option.

Option D:

The PA-5430 does not meet the throughput requirement. Although Layer-2 or Virtual Wire mode preserves the IP structure, the throughput capacity of the PA-5430 is a limiting factor.

Reference from Palo Alto Networks Documentation:

Palo Alto Networks PA-5400 Series Datasheet (latest version)

Specifies the performance capabilities of the PA-5445 and PA-5430 models.

Palo Alto Networks Virtual Wire Deployment Guide

Explains how Virtual Wire mode can be used to transparently inspect traffic without changing the existing IP structure.

Aggregated Ethernet Interface Documentation

Details the configuration and use of aggregate interface groups for high throughput.

asked 14/02/2025
Krishna chaithanya
42 questions

Question 26

Report Export Collapse

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Suggested answer: A, C
Explanation:

5G Security (Answer A):

In this scenario, the mining company operates on a private mobile network, likely powered by 5G technology to ensure low latency and high bandwidth for controlling robots and vehicles.

Palo Alto Networks 5G Security is specifically designed to protect private mobile networks. It prevents exploitation of vulnerabilities in the 5G infrastructure and ensures the control signals sent to the machines are not compromised by attackers.

Key features include network slicing protection, signaling plane security, and secure user plane communications.

IoT Security (Answer C):

The mining operation depends on machines and remote-controlled vehicles, which are IoT devices.

Palo Alto Networks IoT Security provides:

Full device visibility to detect all IoT devices (such as robots, remote vehicles, or sensors).

Behavioral analysis to create risk profiles and identify anomalies in the machines' operations.

This ensures a secure environment for IoT devices, reducing the risk of a device being exploited.

Why Not Cloud NGFW (Answer B):

While Cloud NGFW is critical for protecting cloud-based applications, the specific concern here is protecting control signals and IoT devices rather than external access into the cloud service.

The private mobile network and IoT device protection requirements make 5G Security and IoT Security more relevant.

Why Not Advanced CDSS Bundle (Answer D):

The Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, Advanced URL Filtering) is essential for securing web traffic and detecting threats, but it does not address the specific challenges of securing private mobile networks and IoT devices.

While these services can supplement the design, they are not the primary focus in this use case.

Reference from Palo Alto Networks Documentation:

5G Security for Private Mobile Networks

IoT Security Solution Brief

Cloud NGFW Overview

asked 14/02/2025
Marcel Janssen
40 questions

Question 27

Report Export Collapse

There are no Advanced Threat Prevention log events in a company's SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.

Which action should the systems administrator take next?

Enable the company's Threat Prevention license.

Enable the company's Threat Prevention license.

Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company's SIEM instance.

Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company's SIEM instance.

Have the SIEM vendor troubleshoot its software.

Have the SIEM vendor troubleshoot its software.

Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.

Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.

Suggested answer: D
Explanation:

Understanding the Problem:

The issue is that Advanced Threat Prevention (ATP) logs are visible on the firewall but are not being ingested into the company's SIEM.

This implies that the ATP subscription is working and generating logs on the firewall but the logs are not being forwarded properly to the SIEM.

Action to Resolve:

Log Forwarding Configuration:

Verify that the Security policy rules configured to inspect traffic using Advanced Threat Prevention are set to forward logs to the SIEM instance.

This is a common oversight. Even if the logs are generated locally, they will not be forwarded unless explicitly configured.

Configuration steps to verify in the Palo Alto Networks firewall:

Go to Policies > Security Policies and check the 'Log Forwarding' profile applied.

Ensure the 'Log Forwarding' profile includes the correct settings to forward Threat Logs to the SIEM.

Go to Device > Log Settings and ensure the firewall is set to forward Threat logs to the desired Syslog or SIEM destination.

Why Not the Other Options?

A (Enable the Threat Prevention license):

The problem does not relate to the license; the administrator already confirmed the license is active.

B (Check with the SIEM vendor):

While verifying SIEM functionality is important, the first step is to ensure the logs are being forwarded correctly from the firewall to the SIEM. This is under the systems administrator's control.

C (Have the SIEM vendor troubleshoot):

This step should only be taken after confirming the logs are forwarded properly from the firewall.

Reference from Palo Alto Networks Documentation:

Log Forwarding and Security Policy Configuration

Advanced Threat Prevention Configuration Guide

asked 14/02/2025
Borisov Aleksandr
44 questions

Question 28

Report Export Collapse

A customer asks a systems engineer (SE) how Palo Alto Networks can claim it does not lose throughput performance as more Cloud-Delivered Security Services (CDSS) subscriptions are enabled on the firewall.

Which two concepts should the SE explain to address the customer's concern? (Choose two.)

Parallel Processing

Parallel Processing

Advanced Routing Engine

Advanced Routing Engine

Single Pass Architecture

Single Pass Architecture

Management Data Plane Separation

Management Data Plane Separation

Suggested answer: C, D
Explanation:

Single Pass Architecture (Answer C):

Palo Alto Networks firewalls use Single Pass Architecture, meaning the firewall processes traffic once for all enabled security services.

This avoids duplicating inspection processes for multiple services like Threat Prevention, URL Filtering, and WildFire.

With a single traffic inspection pass, the firewall applies all security policies without degrading performance, even as additional CDSS subscriptions are enabled.

Management Data Plane Separation (Answer D):

The Management Plane and Data Plane are separated on Palo Alto Networks firewalls.

The Management Plane handles configuration, logging, and other administrative tasks, while the Data Plane focuses solely on processing and forwarding traffic.

This architectural design ensures that enabling additional Cloud-Delivered Security Services does not impact throughput or compromise traffic handling efficiency.

Why Not Parallel Processing (Answer A):

While Parallel Processing is beneficial, it is not the main factor in maintaining consistent throughput as more services are enabled. The Single Pass Architecture is the key innovation here.

Why Not Advanced Routing Engine (Answer B):

The Advanced Routing Engine is not directly related to maintaining throughput when enabling CDSS subscriptions. It is more applicable to routing protocols and traffic engineering.

Reference from Palo Alto Networks Documentation:

Single Pass Architecture White Paper

Management and Data Plane Overview

asked 14/02/2025
Reatlehile Motaung
28 questions

Question 29

Report Export Collapse

With Strata Cloud Manager (SCM) or Panorama, customers can monitor and manage which three solutions? (Choose three.)

Prisma Access

Prisma Access

Prisma Cloud

Prisma Cloud

Cortex XSIAM

Cortex XSIAM

NGFW

NGFW

Prisma SD-WAN

Prisma SD-WAN

Suggested answer: A, D, E
Explanation:

Prisma Access (Answer A):

Strata Cloud Manager (SCM) and Panorama provide centralized visibility and management for Prisma Access, Palo Alto Networks' cloud-delivered security platform for remote users and branch offices.

NGFW (Answer D):

Both SCM and Panorama are used to manage and monitor Palo Alto Networks Next-Generation Firewalls (NGFWs) deployed in on-premise, hybrid, or multi-cloud environments.

Prisma SD-WAN (Answer E):

SCM and Panorama integrate with Prisma SD-WAN to manage branch connectivity and security, ensuring seamless operation in an SD-WAN environment.

Why Not B:

Prisma Cloud is a distinct platform designed for cloud-native security and is not directly managed through Strata Cloud Manager or Panorama.

Why Not C:

Cortex XSIAM (Extended Security Intelligence and Automation Management) is part of the Cortex platform and is not managed by SCM or Panorama.

Reference from Palo Alto Networks Documentation:

Strata Cloud Manager Overview

Panorama Features and Benefits

asked 14/02/2025
Tommy Basnes
44 questions

Question 30

Report Export Collapse

What are two methods that a NGFW uses to determine if submitted credentials are valid corporate credentials? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 60 questions
Go to page: of 6
Search

Related questions