Palo Alto Networks Systems Engineer Professional - Hardware Firewall PSE-Strata-Pro-24 Exam Questions

Page: 1 / 14
Total 60 questions
Question 1

Which three known variables can assist with sizing an NGFW appliance? (Choose three.)



Answer : A, B, D

When sizing a Palo Alto Networks NGFW appliance, it's crucial to consider variables that affect its performance and capacity. These include the network's traffic characteristics, application requirements, and expected workloads. Below is the analysis of each option:

Option A: Connections per second

Connections per second (CPS) is a critical metric for determining how many new sessions the firewall can handle per second. High CPS requirements are common in environments with high traffic turnover, such as web servers or applications with frequent session terminations and creations.

This is an important sizing variable.

Option B: Max sessions

Max sessions represent the total number of concurrent sessions the firewall can support. For environments with a large number of users or devices, this metric is critical to prevent session exhaustion.

This is an important sizing variable.

Option C: Packet replication

Packet replication is used in certain configurations, such as TAP mode or port mirroring for traffic inspection. While it impacts performance, it is not a primary variable for firewall sizing as it is a specific use case.

This is not a key variable for sizing.

Option D: App-ID firewall throughput

App-ID throughput measures the firewall's ability to inspect traffic and apply policies based on application signatures. It directly impacts the performance of traffic inspection under real-world conditions.

This is an important sizing variable.

Option E: Telemetry enabled

While telemetry provides data for monitoring and analysis, enabling it does not significantly impact the sizing of the firewall. It is not a core variable for determining firewall performance or capacity.

This is not a key variable for sizing.


Palo Alto Networks documentation on Firewall Sizing Guidelines

Knowledge Base article on Performance and Capacity Sizing

Question 2

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?



Answer : A

When high traffic from Palo Alto Networks NGFWs to Active Directory servers causes performance issues, optimizing the way NGFWs gather user-to-IP mappings is critical. Palo Alto Networks offers multiple ways to collect user identity information, and Cloud Identity Engine provides a solution that reduces the load on AD servers while still ensuring efficient and accurate mapping.

Option A (Correct): Cloud Identity Engine allows NGFWs to gather user-to-IP mappings directly from Active Directory authentication logs or other identity sources without placing heavy traffic on the AD servers. By leveraging this feature, the NGFW can offload authentication-related tasks and efficiently identify users without overloading AD servers. This solution is scalable and minimizes the overhead typically caused by frequent User-ID queries to AD servers.

Option B: Using GlobalProtect Windows SSO to gather user information can add complexity and is not the most efficient solution for this problem. It requires all users to install GlobalProtect agents, which may not be feasible in all environments and can introduce operational challenges.

Option C: Data redistribution involves redistributing user-to-IP mappings from one NGFW (hub) to other NGFWs (spokes). While this can reduce the number of queries sent to AD servers, it assumes the mappings are already being collected from AD servers by the hub, which means the performance issue on the AD servers would persist.

Option D: Using GlobalProtect agents to gather user information is a valid method for environments where GlobalProtect is already deployed, but it is not the most efficient or straightforward solution for the given problem. It also introduces dependencies on agent deployment, configuration, and management.

How to Implement Cloud Identity Engine for User-ID Mapping:

Enable Cloud Identity Engine from the Palo Alto Networks console.

Integrate the Cloud Identity Engine with the AD servers to allow it to retrieve authentication logs directly.

Configure the NGFWs to use the Cloud Identity Engine for User-ID mappings instead of querying the AD servers directly.

Monitor performance to ensure the AD servers are no longer overloaded, and mappings are being retrieved efficiently.


Cloud Identity Engine Overview: https://docs.paloaltonetworks.com/cloud-identity

User-ID Best Practices: https://docs.paloaltonetworks.com

Question 3

What does Policy Optimizer allow a systems engineer to do for an NGFW?



Answer : C

Policy Optimizer is a feature designed to help administrators improve the efficiency and effectiveness of security policies on Palo Alto Networks Next-Generation Firewalls (NGFWs). It focuses on identifying unused or overly permissive policies to streamline and optimize the configuration.

Why 'Identify Security policy rules with unused applications' (Correct Answer C)?

Policy Optimizer provides visibility into existing security policies and identifies rules that have unused or outdated applications. For example:

It can detect if a rule allows applications that are no longer in use.

It can identify rules with excessive permissions, enabling administrators to refine them for better security and performance.

By addressing these issues, Policy Optimizer helps reduce the attack surface and improves the overall manageability of the firewall.

Why not 'Recommend best practices on new policy creation' (Option A)?

Policy Optimizer focuses on optimizing existing policies, not creating new ones. While best practices can be applied during policy refinement, recommending new policy creation is not its purpose.

Why not 'Show unused licenses for Cloud-Delivered Security Services (CDSS) subscriptions and firewalls' (Option B)?

Policy Optimizer is not related to license management or tracking. Identifying unused licenses is outside the scope of its functionality.

Why not 'Act as a migration tool to import policies from third-party vendors' (Option D)?

Policy Optimizer does not function as a migration tool. While Palo Alto Networks offers tools for third-party firewall migration, this is separate from the Policy Optimizer feature.


Question 4

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?



Answer : A

Advanced DNS Security on Palo Alto Networks firewalls is designed to identify and prevent a wide range of DNS-based attacks. Among the listed options, 'High entropy DNS domains' is a specific example of a DNS attack that Advanced DNS Security can detect and block.

Why 'High entropy DNS domains' (Correct Answer A)?

High entropy DNS domains are often used in attacks where randomly generated domain names (e.g., gfh34ksdu.com) are utilized by malware or bots to evade detection. This is a hallmark of Domain Generation Algorithms (DGA)-based attacks. Palo Alto Networks firewalls with Advanced DNS Security use machine learning to detect such domains by analyzing the entropy (randomness) of DNS queries. High entropy values indicate the likelihood of a dynamically generated or malicious domain.

Why not 'Polymorphic DNS' (Option B)?

While polymorphic DNS refers to techniques that dynamically change DNS records to avoid detection, it is not specifically identified as an attack type mitigated by Advanced DNS Security in Palo Alto Networks documentation. The firewall focuses more on the behavior of DNS queries, such as detecting DGA domains or anomalous DNS traffic patterns.

Why not 'CNAME cloaking' (Option C)?

CNAME cloaking involves using CNAME records to redirect DNS queries to malicious or hidden domains. Although Palo Alto firewalls may detect and block malicious DNS redirections, the focus of Advanced DNS Security is primarily on identifying patterns of DNS abuse like DGA domains, tunneling, or high entropy queries.

Why not 'DNS domain rebranding' (Option D)?

DNS domain rebranding involves changing the domain names associated with malicious activity to evade detection. This is typically a tactic used for persistence but is not an example of a DNS attack type specifically addressed by Advanced DNS Security.

Advanced DNS Security focuses on dynamic, real-time identification of suspicious DNS patterns, such as high entropy domains, DNS tunneling, or protocol violations. High entropy DNS domains are directly tied to attack mechanisms like DGAs, making this the correct answer.


Question 5

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?



Answer : B

SASE (Secure Access Service Edge) is a cloud-based solution that combines networking and security capabilities to address modern enterprise needs. However, there are scenarios where an on-premises solution is more appropriate.

A . High growth phase with existing and planned mergers, and with acquisitions being integrated.

This scenario typically favors a SASE solution since it provides flexible, scalable, and centralized security that is ideal for integrating newly acquired businesses.

B . Most employees and applications in close physical proximity in a geographic region.

This scenario supports the choice of an on-premises solution. When employees and applications are concentrated in a single geographic region, traditional on-premises firewalls and centralized security appliances provide cost-effective and efficient protection without the need for distributed, cloud-based infrastructure.

C . Hybrid work and cloud adoption at various locations that have different requirements per site.

This scenario aligns with a SASE solution. Hybrid work and varying site requirements are better addressed by SASE's ability to provide consistent security policies regardless of location.

D . The need to enable business to securely expand its geographical footprint.

Expanding into new geographic areas benefits from the scalability and flexibility of a SASE solution, which can deliver consistent security globally without requiring physical appliances at each location.

Key Takeaways:

On-premises solutions are ideal for geographically concentrated networks with minimal cloud adoption.

SASE is better suited for hybrid work, cloud adoption, and distributed networks.


Palo Alto Networks SASE Overview

On-Premises vs. SASE Deployment Guide

Question 6

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?



Answer : A, C

5G Security (Answer A):

In this scenario, the mining company operates on a private mobile network, likely powered by 5G technology to ensure low latency and high bandwidth for controlling robots and vehicles.

Palo Alto Networks 5G Security is specifically designed to protect private mobile networks. It prevents exploitation of vulnerabilities in the 5G infrastructure and ensures the control signals sent to the machines are not compromised by attackers.

Key features include network slicing protection, signaling plane security, and secure user plane communications.

IoT Security (Answer C):

The mining operation depends on machines and remote-controlled vehicles, which are IoT devices.

Palo Alto Networks IoT Security provides:

Full device visibility to detect all IoT devices (such as robots, remote vehicles, or sensors).

Behavioral analysis to create risk profiles and identify anomalies in the machines' operations.

This ensures a secure environment for IoT devices, reducing the risk of a device being exploited.

Why Not Cloud NGFW (Answer B):

While Cloud NGFW is critical for protecting cloud-based applications, the specific concern here is protecting control signals and IoT devices rather than external access into the cloud service.

The private mobile network and IoT device protection requirements make 5G Security and IoT Security more relevant.

Why Not Advanced CDSS Bundle (Answer D):

The Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, Advanced URL Filtering) is essential for securing web traffic and detecting threats, but it does not address the specific challenges of securing private mobile networks and IoT devices.

While these services can supplement the design, they are not the primary focus in this use case.

Reference from Palo Alto Networks Documentation:

5G Security for Private Mobile Networks

IoT Security Solution Brief

Cloud NGFW Overview


Question 7

An existing customer wants to expand their online business into physical stores for the first time. The customer requires NGFWs at the physical store to handle SD-WAN, security, and data protection needs, while also mandating a vendor-validated deployment method. Which two steps are valid actions for a systems engineer to take? (Choose two.)



Answer : A, C

When assisting a customer in deploying next-generation firewalls (NGFWs) for their new physical store branches, it is crucial to address their requirements for SD-WAN, security, and data protection with a validated deployment methodology. Palo Alto Networks provides robust solutions for branch security and SD-WAN integration, and several steps align with vendor-validated methods:

Option A (Correct): Palo Alto Networks or certified partners provide professional services for validated deployment methods, including SD-WAN, security, and data protection in branch locations. Professional services ensure that the deployment adheres to industry best practices and Palo Alto's validated reference architectures. This ensures a scalable and secure deployment across all branch locations.

Option B: While using Golden Images and a Day 1 configuration can create a consistent baseline for configuration deployment, it does not align directly with the requirement of following vendor-validated deployment methodologies. This step is helpful but secondary to vendor-validated professional services and bespoke deployment planning.

Option C (Correct): A bespoke deployment plan considers the customer's specific architecture, store footprint, and unique security requirements. Palo Alto Networks' system engineers typically collaborate with the customer to design and validate tailored deployments, ensuring alignment with the customer's operational goals while maintaining compliance with validated architectures.

Option D: While Palo Alto Networks provides branch deployment guides (such as the 'On-Premises Network Security for the Branch Deployment Guide'), these guides are primarily reference materials. They do not substitute for vendor-provided professional services or the creation of tailored deployment plans with the customer.


Palo Alto Networks SD-WAN Deployment Guide.

Branch Deployment Architecture Best Practices: https://docs.paloaltonetworks.com

Professional Services Overview: https://www.paloaltonetworks.com/services

Page:    1 / 14   
Total 60 questions