Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Paloalto Networks PSE-Strata-Pro-24 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which two statements correctly describe best practices for sizing a firewall deployment with decryption enabled? (Choose two.)

Options:
A.

SSL decryption traffic amounts vary from network to network.

B.

Large average transaction sizes consume more processing power to decrypt.

C.

Perfect Forward Secrecy (PFS) ephemeral key exchange algorithms such as Diffie-Hellman Ephemeral (DHE) and Elliptic-Curve Diffie-Hellman Exchange (ECDHE) consume more processing resources than Rivest-Shamir-Adleman (RSA) algorithms.

D.

Rivest-Shamir-Adleman (RSA) certificate authentication method (not the RSA key exchange algorithm) consumes more resources than Elliptic Curve Digital Signature Algorithm (ECDSA), but ECDSA is more secure.

Paloalto Networks PSE-Strata-Pro-24 Premium Access
Questions 12

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

Options:
A.

GlobalProtect with multiple authentication profiles for each SAML IdP

B.

Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways

C.

Authentication sequence that has multiple authentication profiles using different authentication methods

D.

Multiple Cloud Identity Engine tenants for each business unit

Questions 13

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparationfor the meeting read: "Customer is struggling with security as they move to cloud apps and remote users." What should the SE recommend to the team in preparation for the meeting?

Options:
A.

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

B.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

C.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

D.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Questions 14

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

Options:
A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Questions 15

A systems engineer (SE) successfully demonstrates NGFW managed by Strata Cloud Manager (SCM) to a company. In the resulting planning phase of the proof of value (POV), the CISO requests a test that shows how the security policies are either meeting, or are progressing toward meeting, industry standards such as Critical Security Controls (CSC), and how the company can verify that it is effectively utilizing the functionality purchased.

During the POV testing timeline, how should the SE verify that the POV will meet the CISO's request?

Options:
A.

Near the end, pull a Security Lifecycle Review (SLR) in the POV and create a report for the customer.

B.

At the beginning, work with the customer to create custom dashboards and reports for any information required, so reports can be pulled as needed by the customer.

C.

Near the end, the customer pulls information from these SCM dashboards: Best Practices, CDSS Adoption, and NGFW Feature Adoption.

D.

At the beginning, use PANhandler golden images that are designed to align to compliance and toturning on the features for the CDSS subscription being tested.

Questions 16

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

Options:
A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Questions 17

A large global company plans to acquire 500 NGFWs to replace its legacy firewalls and has a specific requirement for centralized logging and reporting capabilities.

What should a systems engineer recommend?

Options:
A.

Combine Panorama for firewall management with Palo Alto Networks' cloud-based Strata Logging Service to offer scalability for the company's logging and reporting infrastructure.

B.

Use Panorama for firewall management and to transfer logs from the 500 firewalls directly to a third-party SIEM for centralized logging and reporting.

C.

Highlight the efficiency of PAN-OS, which employs AI to automatically extract critical logs and generate daily executive reports, and confirm that the purchase of 500 NGFWs is sufficient.

D.

Deploy a pair of M-1000 log collectors in the customer data center, and route logs from all 500 firewalls to the log collectors for centralized logging and reporting.

Questions 18

A prospective customer is interested in Palo Alto Networks NGFWs and wants to evaluate the ability to segregate its internal network into unique BGP environments.

Which statement describes the ability of NGFWs to address this need?

Options:
A.

It cannot be addressed because PAN-OS does not support it.

B.

It can be addressed by creating multiple eBGP autonomous systems.

C.

It can be addressed with BGP confederations.

D.

It cannot be addressed because BGP must be fully meshed internally to work.

Exam Code: PSE-Strata-Pro-24
Certification Provider: Paloalto Networks
Exam Name: Palo Alto Networks Systems Engineer Professional - Hardware Firewall
Last Update: Jul 15, 2025
Questions: 60