1. Home
  2. Palo Alto Networks
  3. PSE-Strata-Pro-24 Exam Info
  4. PSE-Strata-Pro-24 Exam Questions

Curious about Actual Palo Alto Networks PSE (PSE-Strata-Pro-24) Exam Questions?

Here are sample Palo Alto Networks Systems Engineer Professional - Hardware Firewall (PSE-Strata-Pro-24) Exam questions from real exam. You can get more Palo Alto Networks PSE (PSE-Strata-Pro-24) Exam premium practice questions at TestInsights.

Page: 1 /
Total 60 questions
Question 1

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?


Correct : A

When high traffic from Palo Alto Networks NGFWs to Active Directory servers causes performance issues, optimizing the way NGFWs gather user-to-IP mappings is critical. Palo Alto Networks offers multiple ways to collect user identity information, and Cloud Identity Engine provides a solution that reduces the load on AD servers while still ensuring efficient and accurate mapping.

Option A (Correct): Cloud Identity Engine allows NGFWs to gather user-to-IP mappings directly from Active Directory authentication logs or other identity sources without placing heavy traffic on the AD servers. By leveraging this feature, the NGFW can offload authentication-related tasks and efficiently identify users without overloading AD servers. This solution is scalable and minimizes the overhead typically caused by frequent User-ID queries to AD servers.

Option B: Using GlobalProtect Windows SSO to gather user information can add complexity and is not the most efficient solution for this problem. It requires all users to install GlobalProtect agents, which may not be feasible in all environments and can introduce operational challenges.

Option C: Data redistribution involves redistributing user-to-IP mappings from one NGFW (hub) to other NGFWs (spokes). While this can reduce the number of queries sent to AD servers, it assumes the mappings are already being collected from AD servers by the hub, which means the performance issue on the AD servers would persist.

Option D: Using GlobalProtect agents to gather user information is a valid method for environments where GlobalProtect is already deployed, but it is not the most efficient or straightforward solution for the given problem. It also introduces dependencies on agent deployment, configuration, and management.

How to Implement Cloud Identity Engine for User-ID Mapping:

Enable Cloud Identity Engine from the Palo Alto Networks console.

Integrate the Cloud Identity Engine with the AD servers to allow it to retrieve authentication logs directly.

Configure the NGFWs to use the Cloud Identity Engine for User-ID mappings instead of querying the AD servers directly.

Monitor performance to ensure the AD servers are no longer overloaded, and mappings are being retrieved efficiently.


Cloud Identity Engine Overview: https://docs.paloaltonetworks.com/cloud-identity

User-ID Best Practices: https://docs.paloaltonetworks.com

Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: "Customer is struggling with security as they move to cloud apps and remote users." What should the SE recommend to the team in preparation for the meeting?


Correct : B

When preparing for a customer meeting, it's important to understand their specific challenges and align solutions accordingly. The notes suggest that the customer is facing difficulties securing their cloud apps and remote users, which are core areas addressed by Palo Alto Networks' Zero Trust and SASE solutions. However, jumping directly into a pitch or product demonstration without validating the customer's specific challenges may fail to build trust or fully address their needs.

Option A: Leading with a pre-structured pitch about Zero Trust principles may not resonate with the customer if their challenges are not fully understood first. The team needs to gather insights into the customer's security pain points before presenting a solution.

Option B (Correct): Discovery questions are a critical step in the sales process, especially when addressing complex topics like Zero Trust. By designing targeted questions about the customer's challenges with identity, devices, data, and access, the SE can identify specific pain points. These insights can then be used to tailor a Zero Trust strategy that directly addresses the customer's concerns. This approach ensures the meeting is customer-focused and demonstrates that the SE understands their unique needs.

Option C: While a product demonstration of GlobalProtect, Prisma Access, and SaaS security is valuable, it should come after discovery. Presenting products prematurely may seem like a generic sales pitch and could fail to address the customer's actual challenges.

Option D: Prisma SASE is an excellent solution for addressing cloud security and remote user challenges, but recommending it without first understanding the customer's specific needs may undermine trust. This step should follow after discovery and validation of the customer's pain points.

Examples of Discovery Questions:

What are your primary security challenges with remote users and cloud applications?

Are you currently able to enforce consistent security policies across your hybrid environment?

How do you handle identity verification and access control for remote users?

What level of visibility do you have into traffic to and from your cloud applications?


Palo Alto Networks Zero Trust Overview: https://www.paloaltonetworks.com/zero-trust

Best Practices for Customer Discovery: https://docs.paloaltonetworks.com/sales-playbooks

Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

A prospective customer wants to validate an NGFW solution and seeks the advice of a systems engineer (SE) regarding a design to meet the following stated requirements:

"We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to 40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing."

Which hardware and architecture/design recommendations should the SE make?


Correct : A

The problem provides several constraints and design requirements that must be carefully considered:

Bandwidth Requirement:

The customer needs an NGFW capable of handling a total throughput of 72 Gbps.

The PA-5445 is specifically designed for high-throughput environments and supports up to 81.3 Gbps Threat Prevention throughput (as per the latest hardware performance specifications). This ensures the throughput needs are fully met with some room for growth.

Interface Compatibility:

The customer mentions that their core switches support up to 40 Gbps interfaces. The design must include aggregate links to meet the overall bandwidth while aligning with the 40 Gbps interface limitations.

The PA-5445 supports 40Gbps QSFP+ interfaces, making it a suitable option for the hardware requirement.

No Change to IP Address Structure:

Since the customer cannot modify their IP address structure, deploying the NGFW in Layer-2 or Virtual Wire mode is ideal.

Virtual Wire mode allows the firewall to inspect traffic transparently between two Layer-2 devices without modifying the existing IP structure. Similarly, Layer-2 mode allows the firewall to behave like a switch at Layer-2 while still applying security policies.

Threat Prevention, DNS, and Sandboxing Requirements:

The customer requires advanced security features like Threat Prevention and potentially sandboxing (WildFire). The PA-5445 is equipped to handle these functionalities with its dedicated hardware-based architecture for content inspection and processing.

Aggregate Interface Groups:

The architecture should include aggregate interface groups to distribute traffic across multiple physical interfaces to support the high throughput requirement.

By aggregating 2 x 40Gbps interfaces on both sides of the path in Virtual Wire or Layer-2 mode, the design ensures sufficient bandwidth (up to 80 Gbps per side).

Why PA-5445 in Layer-2 or Virtual Wire mode is the Best Option:

Option A satisfies all the customer's requirements:

The PA-5445 meets the 72 Gbps throughput requirement.

2 x 40 Gbps interfaces can be aggregated to handle traffic flow between the core switches and the NGFW.

Virtual Wire or Layer-2 mode preserves the IP address structure, while still allowing full threat prevention and DNS inspection capabilities.

The PA-5445 also supports sandboxing (WildFire) for advanced file-based threat detection.

Why Not Other Options:

Option B:

The PA-5430 is insufficient for the throughput requirement (72 Gbps). Its maximum Threat Prevention throughput is 60.3 Gbps, which does not provide the necessary capacity.

Option C:

While the PA-5445 is appropriate, deploying it in Layer-3 mode would require changes to the IP address structure, which the customer explicitly stated is not an option.

Option D:

The PA-5430 does not meet the throughput requirement. Although Layer-2 or Virtual Wire mode preserves the IP structure, the throughput capacity of the PA-5430 is a limiting factor.

Reference from Palo Alto Networks Documentation:

Palo Alto Networks PA-5400 Series Datasheet (latest version)

Specifies the performance capabilities of the PA-5445 and PA-5430 models.

Palo Alto Networks Virtual Wire Deployment Guide

Explains how Virtual Wire mode can be used to transparently inspect traffic without changing the existing IP structure.

Aggregated Ethernet Interface Documentation

Details the configuration and use of aggregate interface groups for high throughput.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?


Correct : A, C

5G Security (Answer A):

In this scenario, the mining company operates on a private mobile network, likely powered by 5G technology to ensure low latency and high bandwidth for controlling robots and vehicles.

Palo Alto Networks 5G Security is specifically designed to protect private mobile networks. It prevents exploitation of vulnerabilities in the 5G infrastructure and ensures the control signals sent to the machines are not compromised by attackers.

Key features include network slicing protection, signaling plane security, and secure user plane communications.

IoT Security (Answer C):

The mining operation depends on machines and remote-controlled vehicles, which are IoT devices.

Palo Alto Networks IoT Security provides:

Full device visibility to detect all IoT devices (such as robots, remote vehicles, or sensors).

Behavioral analysis to create risk profiles and identify anomalies in the machines' operations.

This ensures a secure environment for IoT devices, reducing the risk of a device being exploited.

Why Not Cloud NGFW (Answer B):

While Cloud NGFW is critical for protecting cloud-based applications, the specific concern here is protecting control signals and IoT devices rather than external access into the cloud service.

The private mobile network and IoT device protection requirements make 5G Security and IoT Security more relevant.

Why Not Advanced CDSS Bundle (Answer D):

The Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, Advanced URL Filtering) is essential for securing web traffic and detecting threats, but it does not address the specific challenges of securing private mobile networks and IoT devices.

While these services can supplement the design, they are not the primary focus in this use case.

Reference from Palo Alto Networks Documentation:

5G Security for Private Mobile Networks

IoT Security Solution Brief

Cloud NGFW Overview


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

There are no Advanced Threat Prevention log events in a company's SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.

Which action should the systems administrator take next?


Correct : D

Understanding the Problem:

The issue is that Advanced Threat Prevention (ATP) logs are visible on the firewall but are not being ingested into the company's SIEM.

This implies that the ATP subscription is working and generating logs on the firewall but the logs are not being forwarded properly to the SIEM.

Action to Resolve:

Log Forwarding Configuration:

Verify that the Security policy rules configured to inspect traffic using Advanced Threat Prevention are set to forward logs to the SIEM instance.

This is a common oversight. Even if the logs are generated locally, they will not be forwarded unless explicitly configured.

Configuration steps to verify in the Palo Alto Networks firewall:

Go to Policies > Security Policies and check the 'Log Forwarding' profile applied.

Ensure the 'Log Forwarding' profile includes the correct settings to forward Threat Logs to the SIEM.

Go to Device > Log Settings and ensure the firewall is set to forward Threat logs to the desired Syslog or SIEM destination.

Why Not the Other Options?

A (Enable the Threat Prevention license):

The problem does not relate to the license; the administrator already confirmed the license is active.

B (Check with the SIEM vendor):

While verifying SIEM functionality is important, the first step is to ensure the logs are being forwarded correctly from the firewall to the SIEM. This is under the systems administrator's control.

C (Have the SIEM vendor troubleshoot):

This step should only be taken after confirming the logs are forwarded properly from the firewall.

Reference from Palo Alto Networks Documentation:

Log Forwarding and Security Policy Configuration

Advanced Threat Prevention Configuration Guide


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 12   
Total 60 questions