Palo Alto Networks Systems Engineer Professional - Hardware Firewall PSE-Strata-Pro-24 Exam Questions

Page: 1 / 14
Total 60 questions
Question 1

Which action can help alleviate a prospective customer's concerns about transitioning from a legacy firewall with port-based policies to a Palo Alto Networks NGFW with application-based policies?



Answer : A

A . Discuss the PAN-OS Policy Optimizer feature as a means to safely migrate port-based rules to application-based rules.

PAN-OS includes the Policy Optimizer tool, which helps migrate legacy port-based rules to application-based policies incrementally and safely. This tool identifies unused, redundant, or overly permissive rules and suggests optimized policies based on actual traffic patterns.

Why Other Options Are Incorrect

B: The migration wizard does not automatically convert port-based rules to application-based rules. Migration must be carefully planned and executed using tools like the Policy Optimizer.

C: Running two firewalls in parallel adds unnecessary complexity and is not a best practice for migration.

D: While port-based rules are supported, relying on them defeats the purpose of transitioning to application-based security.


Palo Alto Networks Policy Optimizer

Question 2

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?



Answer : A, B

After a customer has concluded an evaluation of Palo Alto Networks solutions, it is critical to provide a detailed analysis of the results and benefits gained during the evaluation. The following two tools are most appropriate:

Why 'Best Practice Assessment (BPA)' (Correct Answer A)?

The BPA evaluates the customer's firewall configuration against Palo Alto Networks' recommended best practices. It highlights areas where the configuration could be improved to strengthen security posture. This is an excellent tool to showcase how adopting Palo Alto Networks' best practices aligns with industry standards and improves security performance.

Why 'Security Lifecycle Review (SLR)' (Correct Answer B)?

The SLR provides insights into the customer's security environment based on data collected during the evaluation. It identifies vulnerabilities, risks, and malicious activities observed in the network and demonstrates how Palo Alto Networks' solutions can address these issues. SLR reports use clear visuals and metrics, making it easier to showcase the benefits of the evaluation.

Why not 'Firewall Sizing Guide' (Option C)?

The Firewall Sizing Guide is a pre-sales tool used to recommend the appropriate firewall model based on the customer's network size, performance requirements, and other criteria. It is not relevant for showcasing the benefits of an evaluation.

Why not 'Golden Images' (Option D)?

Golden Images refer to pre-configured templates for deploying firewalls in specific use cases. While useful for operational efficiency, they are not tools for demonstrating the outcomes or benefits of a customer evaluation.


Question 3

In addition to DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions are minimum recommendations for all NGFWs that handle north-south traffic? (Choose three)



Answer : B, D, E

North-south traffic refers to the flow of data in and out of a network, typically between internal resources and the internet. To secure this type of traffic, Palo Alto Networks recommends specific CDSS subscriptions in addition to DNS Security:

A . SaaS Security

SaaS Security is designed for monitoring and securing SaaS application usage but is not essential for handling typical north-south traffic.

B . Advanced WildFire

Advanced WildFire provides cloud-based malware analysis and sandboxing to detect and block zero-day threats. It is a critical component for securing north-south traffic against advanced malware.

C . Enterprise DLP

Enterprise DLP focuses on data loss prevention, primarily for protecting sensitive data. While important, it is not a minimum recommendation for securing north-south traffic.

D . Advanced Threat Prevention

Advanced Threat Prevention (ATP) replaces traditional IPS and provides inline detection and prevention of evasive threats in north-south traffic. It is a crucial recommendation for protecting against sophisticated threats.

E . Advanced URL Filtering

Advanced URL Filtering prevents access to malicious or harmful URLs. It complements DNS Security to provide comprehensive web protection for north-south traffic.

Key Takeaways:

Advanced WildFire, Advanced Threat Prevention, and Advanced URL Filtering are minimum recommendations for NGFWs handling north-south traffic, alongside DNS Security.

SaaS Security and Enterprise DLP, while valuable, are not minimum requirements for this use case.


Palo Alto Networks NGFW Best Practices

Cloud-Delivered Security Services

Question 4

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?



Answer : A, C

5G Security (Answer A):

In this scenario, the mining company operates on a private mobile network, likely powered by 5G technology to ensure low latency and high bandwidth for controlling robots and vehicles.

Palo Alto Networks 5G Security is specifically designed to protect private mobile networks. It prevents exploitation of vulnerabilities in the 5G infrastructure and ensures the control signals sent to the machines are not compromised by attackers.

Key features include network slicing protection, signaling plane security, and secure user plane communications.

IoT Security (Answer C):

The mining operation depends on machines and remote-controlled vehicles, which are IoT devices.

Palo Alto Networks IoT Security provides:

Full device visibility to detect all IoT devices (such as robots, remote vehicles, or sensors).

Behavioral analysis to create risk profiles and identify anomalies in the machines' operations.

This ensures a secure environment for IoT devices, reducing the risk of a device being exploited.

Why Not Cloud NGFW (Answer B):

While Cloud NGFW is critical for protecting cloud-based applications, the specific concern here is protecting control signals and IoT devices rather than external access into the cloud service.

The private mobile network and IoT device protection requirements make 5G Security and IoT Security more relevant.

Why Not Advanced CDSS Bundle (Answer D):

The Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, Advanced URL Filtering) is essential for securing web traffic and detecting threats, but it does not address the specific challenges of securing private mobile networks and IoT devices.

While these services can supplement the design, they are not the primary focus in this use case.

Reference from Palo Alto Networks Documentation:

5G Security for Private Mobile Networks

IoT Security Solution Brief

Cloud NGFW Overview


Question 5

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.

Which subscription(s) should the systems engineer recommend?



Answer : C

DNS Security (Answer C):

DNS Security is the appropriate subscription for addressing threats over port 53.

DNS tunneling is a common method used for data exfiltration, infiltration, and C2 activities, as it allows malicious traffic to be hidden within legitimate DNS queries.

The DNS Security service applies machine learning models to analyze DNS queries in real-time, block malicious domains, and prevent tunneling activities.

It integrates seamlessly with the NGFW, ensuring advanced protection against DNS-based threats without requiring additional infrastructure.

Why Not Threat Prevention (Answer A):

Threat Prevention is critical for blocking malware, exploits, and vulnerabilities, but it does not specifically address DNS-based tunneling or C2 activities over port 53.

Why Not App-ID and Data Loss Prevention (Answer B):

While App-ID can identify applications, and Data Loss Prevention (DLP) helps prevent sensitive data leakage, neither focuses on blocking DNS tunneling or malicious activity over port 53.

Why Not Advanced Threat Prevention and Advanced URL Filtering (Answer D):

Advanced Threat Prevention and URL Filtering are excellent for broader web and network threats, but DNS tunneling specifically requires the DNS Security subscription, which specializes in DNS-layer threats.

Reference from Palo Alto Networks Documentation:

DNS Security Subscription Overview


Question 6

A prospective customer has provided specific requirements for an upcoming firewall purchase, including the need to process a minimum of 200,000 connections per second while maintaining at least 15 Gbps of throughput with App-ID and Threat Prevention enabled.

What should a systems engineer do to determine the most suitable firewall for the customer?



Answer : B

Firewall Sizing Tool (Answer B):

The firewall sizing tool is the most accurate way to determine the suitable firewall model based on specific customer requirements, such as throughput, connections per second, and enabled features like App-ID and Threat Prevention.

By inputting traffic patterns, feature requirements, and performance needs, the sizing tool provides tailored recommendations.

Why Not A:

While uploading traffic logs to the calculator tool may help analyze traffic trends, it is not the primary method for determining firewall sizing.

Why Not C or D:

The product configurator tool and product selector tool are not designed for detailed performance analysis based on real-world requirements like connections per second or enabled features.

Reference from Palo Alto Networks Documentation:

Firewall Sizing Guide


Question 7

Which two statements correctly describe best practices for sizing a firewall deployment with decryption enabled? (Choose two.)



Answer : A, C

When planning a firewall deployment with SSL/TLS decryption enabled, it is crucial to consider the additional processing overhead introduced by decrypting and inspecting encrypted traffic. Here are the details for each statement:

Why 'SSL decryption traffic amounts vary from network to network' (Correct Answer A)?

SSL decryption traffic varies depending on the organization's specific network environment, user behavior, and applications. For example, networks with heavy web traffic, cloud applications, or encrypted VoIP traffic will have more SSL/TLS decryption processing requirements. This variability means each deployment must be properly assessed and sized accordingly.

Why 'Perfect Forward Secrecy (PFS) ephemeral key exchange algorithms such as Diffie-Hellman Ephemeral (DHE) and Elliptic-Curve Diffie-Hellman Exchange (ECDHE) consume more processing resources than Rivest-Shamir-Adleman (RSA) algorithms' (Correct Answer C)?

PFS algorithms like DHE and ECDHE generate unique session keys for each connection, ensuring better security but requiring significantly more processing power compared to RSA key exchange. When decryption is enabled, firewalls must handle these computationally expensive operations for every encrypted session, impacting performance and sizing requirements.

Why not 'Large average transaction sizes consume more processing power to decrypt' (Option B)?

While large transaction sizes can consume additional resources, SSL/TLS decryption is more dependent on the number of sessions and the complexity of the encryption algorithms used, rather than the size of the transactions. Hence, this is not a primary best practice consideration.

Why not 'Rivest-Shamir-Adleman (RSA) certificate authentication method consumes more resources than Elliptic Curve Digital Signature Algorithm (ECDSA), but ECDSA is more secure' (Option D)?

This statement discusses certificate authentication methods, not SSL/TLS decryption performance. While ECDSA is more efficient and secure than RSA, it is not directly relevant to sizing considerations for firewall deployments with decryption enabled.


Page:    1 / 14   
Total 60 questions