Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

PSE-Strata-Pro-24 Exam Dumps - Paloalto Networks PSE-Strata Professional Questions and Answers

Question # 4

A security engineer has been tasked with protecting a company's on-premises web servers but is not authorized to purchase a web application firewall (WAF).

Which Palo Alto Networks solution will protect the company from SQL injection zero-day, command injection zero-day, Cross-Site Scripting (XSS) attacks, and IIS exploits?

Options:

A.

Threat Prevention and PAN-OS 11.x

B.

Advanced Threat Prevention and PAN-OS 11.x

C.

Threat Prevention, Advanced URL Filtering, and PAN-OS 10.2 (and higher)

D.

Advanced WildFire and PAN-OS 10.0 (and higher)

Buy Now
Question # 5

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

Options:

A.

GlobalProtect with multiple authentication profiles for each SAML IdP

B.

Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways

C.

Authentication sequence that has multiple authentication profiles using different authentication methods

D.

Multiple Cloud Identity Engine tenants for each business unit

Buy Now
Question # 6

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?

Options:

A.

Best Practice Assessment (BPA)

B.

Security Lifecycle Review (SLR)

C.

Firewall Sizing Guide

D.

Golden Images

Buy Now
Question # 7

In which two locations can a Best Practice Assessment (BPA) report be generated for review by a customer? (Choose two.)

Options:

A.

PANW Partner Portal

B.

Customer Support Portal

C.

AIOps

D.

Strata Cloud Manager (SCM)

Buy Now
Question # 8

Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?

Options:

A.

Use DNS Security to limit access to file-sharing applications based on job functions.

B.

Use App-ID to limit access to file-sharing applications based on job functions.

C.

Use DNS Security to block all file-sharing applications and uploading abilities.

D.

Use App-ID to block all file-sharing applications and uploading abilities.

Buy Now
Question # 9

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

Options:

A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Buy Now
Question # 10

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

Options:

A.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

B.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

C.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

D.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Buy Now
Question # 11

A company with a large Active Directory (AD) of over 20,000 groups has user roles based on group membership in the directory. Up to 1,000 groups may be used in Security policies. The company has limited operations personnel and wants to reduce the administrative overhead of managing the synchronization of the groups with their firewalls.

What is the recommended architecture to synchronize the company's AD with Palo Alto Networks firewalls?

Options:

A.

Configure a group mapping profile with custom filters for LDAP attributes that are mapped to the user roles.

B.

Configure a group mapping profile, without a filter, to synchronize all groups.

C.

Configure a group mapping profile with an include group list.

D.

Configure NGFWs to synchronize with the AD after deploying the Cloud Identity Engine (CIE) and agents.

Buy Now
Question # 12

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

Options:

A.

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.

B.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.

C.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.

D.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.

Buy Now
Question # 13

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

Options:

A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Buy Now
Exam Code: PSE-Strata-Pro-24
Exam Name: Palo Alto Networks Systems Engineer Professional - Hardware Firewall
Last Update: Feb 21, 2025
Questions: 60
PSE-Strata-Pro-24 pdf

PSE-Strata-Pro-24 PDF

$25.5  $84.99
PSE-Strata-Pro-24 Engine

PSE-Strata-Pro-24 Testing Engine

$28.5  $94.99
PSE-Strata-Pro-24 PDF + Engine

PSE-Strata-Pro-24 PDF + Testing Engine

$40.5  $134.99