Palo Alto Networks Systems Engineer Professional - Hardware Firewall PSE-Strata-Pro-24 Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?



Answer : B

Segregating a network into unique BGP environments requires the ability to configure separate eBGP autonomous systems (AS) within the NGFW. Palo Alto Networks firewalls support advanced BGP features, including the ability to create and manage multiple autonomous systems.

Why 'It can be addressed by creating multiple eBGP autonomous systems' (Correct Answer B)?

PAN-OS supports the configuration of multiple eBGP AS environments. By creating unique eBGP AS numbers for different parts of the network, traffic can be segregated and routed separately. This feature is commonly used in multi-tenant environments or networks requiring logical separation for administrative or policy reasons.

Each eBGP AS can maintain its own routing policies, neighbors, and traffic segmentation.

This approach allows the NGFW to address the customer's need for segregated internal BGP environments.

Why not 'It cannot be addressed because PAN-OS does not support it' (Option A)?

This statement is incorrect because PAN-OS fully supports BGP, including eBGP, iBGP, and features like route reflectors, confederations, and autonomous systems.

Why not 'It can be addressed with BGP confederations' (Option C)?

While BGP confederations can logically group AS numbers within a single AS, they are generally used to simplify iBGP designs in very large-scale networks. They are not commonly used for segregating internal environments and are not required for the described use case.

Why not 'It cannot be addressed because BGP must be fully meshed internally to work' (Option D)?

Full mesh iBGP is only required in environments without route reflectors. The described scenario does not mention the need for iBGP full mesh; instead, it focuses on segregated environments, which can be achieved with eBGP.


Question 2

Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)



Answer : A, C

Strata Cloud Manager (SCM), part of Palo Alto Networks' Prisma Access and Prisma SD-WAN suite, provides enhanced visibility and control for managing compliance and security policies across the network. In the Premium version of SCM, compliance frameworks are pre-integrated to help organizations streamline audits and maintain adherence to critical standards.

A . Payment Card Industry (PCI)

PCI DSS (Data Security Standard) compliance is essential for businesses that handle payment card data. SCM Premium provides monitoring, reporting, and auditing tools that align with PCI requirements, ensuring that sensitive payment data is processed securely across the network.

B . National Institute of Standards and Technology (NIST)

NIST is a comprehensive cybersecurity framework used in various industries, especially in the government sector. However, NIST is not specifically included in SCM Premium; organizations may need separate configurations or external tools to fully comply with NIST guidelines.

C . Center for Internet Security (CIS)

CIS benchmarks provide security best practices for securing IT systems and data. SCM Premium includes CIS compliance checks, enabling organizations to maintain a strong baseline security posture and proactively address vulnerabilities.

D . Health Insurance Portability and Accountability Act (HIPAA)

HIPAA is a framework designed to protect sensitive healthcare information. While Palo Alto Networks provides general solutions that can be aligned with HIPAA compliance, it is not explicitly included as a compliance framework in SCM Premium.

Key Takeaways:

The frameworks included in SCM Premium are PCI DSS and CIS.

Other frameworks like NIST and HIPAA may require additional configurations or are supported indirectly but not explicitly part of the Premium compliance checks.


Palo Alto Networks Strata Cloud Manager Documentation

Palo Alto Networks Compliance Resources

Question 3

Device-ID can be used in which three policies? (Choose three.)



Answer : A, C, E

Device-ID is a feature in Palo Alto Networks firewalls that identifies devices based on their unique attributes (e.g., MAC addresses, device type, operating system). Device-ID can be used in several policy types to provide granular control. Here's how it applies to each option:

Option A: Security

Device-ID can be used in Security policies to enforce rules based on the device type or identity. For example, you can create policies that allow or block traffic for specific device types (e.g., IoT devices).

This is correct.

Option B: Decryption

Device-ID cannot be used in decryption policies. Decryption policies are based on traffic types, certificates, and other SSL/TLS attributes, not device attributes.

This is incorrect.

Option C: Policy-based forwarding (PBF)

Device-ID can be used in PBF policies to control the forwarding of traffic based on the identified device. For example, you can route traffic from certain device types through specific ISPs or VPN tunnels.

This is correct.

Option D: SD-WAN

SD-WAN policies use metrics such as path quality (e.g., latency, jitter) and application information for traffic steering. Device-ID is not a criterion used in SD-WAN policies.

This is incorrect.

Option E: Quality of Service (QoS)

Device-ID can be used in QoS policies to apply traffic shaping or bandwidth control for specific devices. For example, you can prioritize or limit bandwidth for traffic originating from IoT devices or specific endpoints.

This is correct.


Palo Alto Networks documentation on Device-ID

Question 4

A company plans to deploy identity for improved visibility and identity-based controls for least privilege access to applications and dat

a. The company does not have an on-premises Active Directory (AD) deployment, and devices are connected and managed by using a combination of Entra ID and Jamf.

Which two supported sources for identity are appropriate for this environment? (Choose two.)



Answer : C, D

In this scenario, the company does not use on-premises Active Directory and manages devices with Entra ID and Jamf, which implies a cloud-native and modern management setup. Below is the evaluation of each option:

Option A: Captive portal

Captive portal is typically used in environments where identity mapping is needed for unmanaged devices or guest users. It provides a mechanism for users to authenticate themselves through a web interface.

However, in this case, the company is managing devices using Entra ID and Jamf, which means identity information can already be centralized through other means. Captive portal is not an ideal solution here.

This option is not appropriate.

Option B: User-ID agents configured for WMI client probing

WMI (Windows Management Instrumentation) client probing is a mechanism used to map IP addresses to usernames in a Windows environment. This approach is specific to on-premises Active Directory deployments and requires direct communication with Windows endpoints.

Since the company does not have an on-premises AD and is using Entra ID and Jamf, this method is not applicable.

This option is not appropriate.

Option C: GlobalProtect with an internal gateway deployment

GlobalProtect is Palo Alto Networks' VPN solution, which allows for secure remote access. It also supports identity-based mapping when deployed with internal gateways.

In this case, GlobalProtect with an internal gateway can serve as a mechanism to provide user and device visibility based on the managed devices connecting through the gateway.

This option is appropriate.

Option D: Cloud Identity Engine synchronized with Entra ID

The Cloud Identity Engine provides a cloud-based approach to synchronize identity information from identity providers like Entra ID (formerly Azure AD).

In a cloud-native environment with Entra ID and Jamf, the Cloud Identity Engine is a natural fit as it integrates seamlessly to provide identity visibility for applications and data.

This option is appropriate.


Palo Alto Networks documentation on Cloud Identity Engine

GlobalProtect configuration and use cases in Palo Alto Knowledge Base

Question 5

A customer claims that Advanced WildFire miscategorized a file as malicious and wants proof, because another vendor has said that the file is benign.

How could the systems engineer assure the customer that Advanced WildFire was accurate?



Answer : B

Advanced WildFire is Palo Alto Networks' cloud-based malware analysis and prevention solution. It determines whether files are malicious by executing them in a sandbox environment and observing their behavior. To address the customer's concern about the file categorization, the systems engineer must provide evidence of the file's behavior. Here's the analysis of each option:

Option A: Review the threat logs for information to provide to the customer

Threat logs can provide a summary of events and verdicts for malicious files, but they do not include the detailed behavior analysis needed to convince the customer.

While reviewing the logs is helpful as a preliminary step, it does not provide the level of proof the customer needs.

This option is not sufficient on its own.

Option B: Use the WildFire Analysis Report in the log to show the customer the malicious actions the file took when it was detonated

WildFire generates an analysis report that includes details about the file's behavior during detonation in the sandbox, such as network activity, file modifications, process executions, and any indicators of compromise (IoCs).

This report provides concrete evidence to demonstrate why the file was flagged as malicious. It is the most accurate way to assure the customer that WildFire's decision was based on observed malicious actions.

This is the best option.

Option C: Open a TAG ticket for the customer and allow support engineers to determine the appropriate action

While opening a support ticket is a valid action for further analysis or appeal, it is not a direct way to assure the customer of the current WildFire verdict.

This option does not directly address the customer's request for immediate proof.

This option is not ideal.

Option D: Do nothing because the customer will realize Advanced WildFire is right

This approach is dismissive of the customer's concerns and does not provide any evidence to support WildFire's decision.

This option is inappropriate.


Palo Alto Networks documentation on WildFire

WildFire Analysis Reports

Question 6

While a quote is being finalized for a customer that is purchasing multiple PA-5400 series firewalls, the customer specifies the need for protection against zero-day malware attacks.

Which Cloud-Delivered Security Services (CDSS) subscription add-on license should be included in the quote?



Answer : C

Zero-day malware attacks are sophisticated threats that exploit previously unknown vulnerabilities or malware signatures. To provide protection against such attacks, the appropriate Cloud-Delivered Security Service subscription must be included.

Why 'Advanced WildFire' (Correct Answer C)?

Advanced WildFire is Palo Alto Networks' sandboxing solution that identifies and prevents zero-day malware. It uses machine learning, dynamic analysis, and static analysis to detect unknown malware in real time.

Files and executables are analyzed in the cloud-based sandbox, and protections are shared globally within minutes.

Advanced WildFire specifically addresses zero-day threats by dynamically analyzing suspicious files and generating new signatures.

Why not 'AI Access Security' (Option A)?

AI Access Security is designed to secure SaaS applications by monitoring and enforcing data protection and compliance. While useful for SaaS security, it does not focus on detecting or preventing zero-day malware.

Why not 'Advanced Threat Prevention' (Option B)?

Advanced Threat Prevention (ATP) focuses on detecting zero-day exploits (e.g., SQL injection, buffer overflows) using inline deep learning but is not specifically designed to analyze and prevent zero-day malware. ATP complements Advanced WildFire, but WildFire is the primary solution for malware detection.

Why not 'App-ID' (Option D)?

App-ID identifies and controls applications on the network. While it improves visibility and security posture, it does not address zero-day malware detection or prevention.


Question 7

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company's network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?



Answer : A

To configure GlobalProtect to authenticate users from multiple SAML identity providers (IdPs), the correct approach involves creating multiple authentication profiles, one for each IdP. Here's the analysis of each option:

Option A: GlobalProtect with multiple authentication profiles for each SAML IdP

GlobalProtect allows configuring multiple SAML authentication profiles, each corresponding to a specific IdP.

These profiles are associated with the GlobalProtect portal or gateway. When users attempt to authenticate, they can be directed to the appropriate IdP based on their domain or other attributes.

This is the correct approach to enable authentication for users from multiple IdPs.

Option B: Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways

The Cloud Identity Engine (CIE) can synchronize identities from multiple directories, but it does not directly support multiple SAML IdPs for a shared GlobalProtect setup.

This option is not applicable.

Option C: Authentication sequence that has multiple authentication profiles using different authentication methods

Authentication sequences allow multiple authentication methods (e.g., LDAP, RADIUS, SAML) to be tried in sequence for the same user, but they are not designed for handling multiple SAML IdPs.

This option is not appropriate for the scenario.

Option D: Multiple Cloud Identity Engine tenants for each business unit

Deploying multiple CIE tenants for each business unit adds unnecessary complexity and is not required for configuring GlobalProtect to authenticate users to multiple SAML IdPs.

This option is not appropriate.


Page:    1 / 14   
Total 60 questions