Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers

Questions 4

A company plans to deploy identity for improved visibility and identity-based controls for least privilege access to applications and data. The company does not have an on-premises Active Directory (AD) deployment, and devices are connected and managed by using a combination of Entra ID and Jamf.

Which two supported sources for identity are appropriate for this environment? (Choose two.)

Options:

A.

Captive portal

B.

User-ID agents configured for WMI client probing

C.

GlobalProtect with an internal gateway deployment

D.

Cloud Identity Engine synchronized with Entra ID

Buy Now
Questions 5

What is the minimum configuration to stop a Cobalt Strike Malleable C2 attack inline and in real time?

Options:

A.

Next-Generation CASB on PAN-OS 10.1

B.

Advanced Threat Prevention and PAN-OS 10.2

C.

Threat Prevention and Advanced WildFire with PAN-OS 10.0

D.

DNS Security, Threat Prevention, and Advanced WildFire with PAN-OS 9.x

Buy Now
Questions 6

Which three descriptions apply to a perimeter firewall? (Choose three.)

Options:

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Buy Now
Questions 7

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.

Which subscription(s) should the systems engineer recommend?

Options:

A.

Threat Prevention

B.

App-ID and Data Loss Prevention

C.

DNS Security

D.

Advanced Threat Prevention and Advanced URL Filtering

Buy Now
Questions 8

A customer has acquired 10 new branch offices, each with fewer than 50 users and no existing firewall. The systems engineer wants to recommend a PA-Series NGFW with Advanced Threat Prevention at each branch location. Which NGFW series is the most cost-efficient at securing internet traffic?

Options:

A.

PA-200

B.

PA-400

C.

PA-500

D.

PA-600

Buy Now
Questions 9

Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)

Options:

A.

Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.

B.

Apply decryption where possible to inspect and log all new and existing traffic flows.

C.

Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.

D.

Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.

Buy Now
Questions 10

Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)

Options:

A.

XML API

B.

Captive portal

C.

User-ID

D.

SCP log ingestion

Buy Now
Questions 11

Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer's business when they show interest in adopting Zero Trust? (Choose two.)

Options:

A.

Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure.

B.

Explain how Palo Alto Networks can place virtual NGFWs across the customer's network to ensure assets and traffic are seen and controlled.

C.

Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust.

D.

Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase.

Buy Now
Questions 12

What is used to stop a DNS-based threat?

Options:

A.

DNS proxy

B.

Buffer overflow protection

C.

DNS tunneling

D.

DNS sinkholing

Buy Now
Questions 13

A customer claims that Advanced WildFire miscategorized a file as malicious and wants proof, because another vendor has said that the file is benign.

How could the systems engineer assure the customer that Advanced WildFire was accurate?

Options:

A.

Review the threat logs for information to provide to the customer.

B.

Use the WildFire Analysis Report in the log to show the customer the malicious actions the file took when it was detonated.

C.

Open a TAG ticket for the customer and allow support engineers to determine the appropriate action.

D.

Do nothing because the customer will realize Advanced WildFire is right.

Buy Now
Questions 14

A customer sees unusually high DNS traffic to an unfamiliar IP address. Which Palo Alto Networks Cloud-Delivered Security Services (CDSS) subscription should be enabled to further inspect this traffic?

Options:

A.

Advanced Threat Prevention

B.

Advanced WildFire

C.

Advanced URL Filtering

D.

Advanced DNS Security

Buy Now
Questions 15

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

Options:

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.

Buy Now
Questions 16

What are the first two steps a customer should perform as they begin to understand and adopt Zero Trust principles? (Choose two)

Options:

A.

Understand which users, devices, infrastructure, applications, data, and services are part of the network or have access to it.

B.

Enable relevant Cloud-Delivered Security Services (CDSS) subscriptions to automatically protect the customer's environment from both internal and external threats.

C.

Map the transactions between users, applications, and data, then verify and inspect those transactions.

D.

Implement VM-Series NGFWs in the customer’s public and private clouds to protect east-west traffic.

Buy Now
Questions 17

A prospective customer has provided specific requirements for an upcoming firewall purchase, including the need to process a minimum of 200,000 connections per second while maintaining at least 15 Gbps of throughput with App-ID and Threat Prevention enabled.

What should a systems engineer do to determine the most suitable firewall for the customer?

Options:

A.

Upload 30 days of customer firewall traffic logs to the firewall calculator tool on the Palo Alto Networks support portal.

B.

Download the firewall sizing tool from the Palo Alto Networks support portal.

C.

Use the online product configurator tool provided on the Palo Alto Networks website.

D.

Use the product selector tool available on the Palo Alto Networks website.

Buy Now
Questions 18

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

Options:

A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Buy Now
Exam Code: PSE-Strata-Pro-24
Exam Name: Palo Alto Networks Systems Engineer Professional - Hardware Firewall
Last Update: Oct 8, 2025
Questions: 60

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99