- Home
- Paloalto Networks
- PSE-Strata Professional
- PSE-Strata-Pro-24
- Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers
PSE-Strata-Pro-24 Palo Alto Networks Systems Engineer Professional - Hardware Firewall Questions and Answers
Which action can help alleviate a prospective customer ' s concerns about transitioning from a legacy firewall with port-based policies to a Palo Alto Networks NGFW with application-based policies?
Options:
Discuss the PAN-OS Policy Optimizer feature as a means to safely migrate port-based rules to application-based rules.
Assure the customer that the migration wizard will automatically convert port-based rules to application-based rules upon installation of the new NGFW.
Recommend deploying a new NGFW firewall alongside the customer ' s existing port-based firewall until they are comfortable removing the port-based firewall.
Reassure the customer that the NGFW supports the continued use of port-based rules, as PAN-OS automatically translates these policies into application-based policies.
Answer:
AExplanation:
A. Discuss the PAN-OS Policy Optimizer feature as a means to safely migrate port-based rules to application-based rules.
PAN-OS includes the Policy Optimizer tool, which helps migrate legacy port-based rules to application-based policies incrementally and safely. This tool identifies unused, redundant, or overly permissive rules and suggests optimized policies based on actual traffic patterns.
Why Other Options Are Incorrect
B: The migration wizard does not automatically convert port-based rules to application-based rules. Migration must be carefully planned and executed using tools like the Policy Optimizer.
C: Running two firewalls in parallel adds unnecessary complexity and is not a best practice for migration.
D: While port-based rules are supported, relying on them defeats the purpose of transitioning to application-based security.
What are the first two steps a customer should perform as they begin to understand and adopt Zero Trust principles? (Choose two)
Options:
Understand which users, devices, infrastructure, applications, data, and services are part of the network or have access to it.
Enable relevant Cloud-Delivered Security Services (CDSS) subscriptions to automatically protect the customer ' s environment from both internal and external threats.
Map the transactions between users, applications, and data, then verify and inspect those transactions.
Implement VM-Series NGFWs in the customer’s public and private clouds to protect east-west traffic.
Answer:
A, CExplanation:
Zero Trust principles revolve around minimizing trust in the network and verifying every interaction. To adopt Zero Trust, customers should start by gaining visibility and understanding the network and its transactions.
A. Understand which users, devices, infrastructure, applications, data, and services are part of the network or have access to it.
The first step in adopting Zero Trust is understanding the full scope of the network. Identifying users, devices, applications, and data is critical for building a comprehensive security strategy.
C. Map the transactions between users, applications, and data, then verify and inspect those transactions.
After identifying all assets, the next step is to map interactions and enforce verification and inspection of these transactions to ensure security.
Why Other Options Are Incorrect
B: Enabling CDSS subscriptions is important for protection but comes after foundational Zero Trust principles are established.
D: Implementing VM-Series NGFWs is part of enforcing Zero Trust, but it is not the first step. Visibility and understanding come first.
Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)
Options:
XML API
Captive portal
User-ID
SCP log ingestion
Answer:
A, BExplanation:
Step 1: Understanding User-to-IP Mappings
User-to-IP mappings are the foundation of User-ID, a core feature of Strata Hardware Firewalls (e.g., PA-400 Series, PA-5400 Series). These mappings link a user’s identity (e.g., username) to their device’s IP address, enabling policy enforcement based on user identity rather than just IP. Palo Alto Networks supports multiple methods to populate these mappings, depending on the network environment and authentication mechanisms.
Purpose: Allows the firewall to apply user-based policies, monitor user activity, and generate user-specific logs.
Strata Context: On a PA-5445, User-ID integrates with App-ID and security subscriptions to enforce granular access control.
What does Policy Optimizer allow a systems engineer to do for an NGFW?
Options:
Recommend best practices on new policy creation
Show unused licenses for Cloud-Delivered Security Services (CDSS) subscriptions and firewalls
Identify Security policy rules with unused applications
Act as a migration tool to import policies from third-party vendors
Answer:
CExplanation:
Policy Optimizer is a feature designed to help administrators improve the efficiency and effectiveness of security policies on Palo Alto Networks Next-Generation Firewalls (NGFWs). It focuses on identifying unused or overly permissive policies to streamline and optimize the configuration.
Why " Identify Security policy rules with unused applications " (Correct Answer C)? Policy Optimizer provides visibility into existing security policies and identifies rules that have unused or outdated applications. For example:
It can detect if a rule allows applications that are no longer in use.
It can identify rules with excessive permissions, enabling administrators to refine them for better security and performance. By addressing these issues, Policy Optimizer helps reduce the attack surface and improves the overall manageability of the firewall.
Why not " Recommend best practices on new policy creation " (Option A)? Policy Optimizer focuses on optimizing existing policies , not creating new ones. While best practices can be applied during policy refinement, recommending new policy creation is not its purpose.
Why not " Show unused licenses for Cloud-Delivered Security Services (CDSS) subscriptions and firewalls " (Option B)? Policy Optimizer is not related to license management or tracking. Identifying unused licenses is outside the scope of its functionality.
Why not " Act as a migration tool to import policies from third-party vendors " (Option D)? Policy Optimizer does not function as a migration tool. While Palo Alto Networks offers tools for third-party firewall migration, this is separate from the Policy Optimizer feature.
Which two statements correctly describe best practices for sizing a firewall deployment with decryption enabled? (Choose two.)
Options:
SSL decryption traffic amounts vary from network to network.
Large average transaction sizes consume more processing power to decrypt.
Perfect Forward Secrecy (PFS) ephemeral key exchange algorithms such as Diffie-Hellman Ephemeral (DHE) and Elliptic-Curve Diffie-Hellman Exchange (ECDHE) consume more processing resources than Rivest-Shamir-Adleman (RSA) algorithms.
Rivest-Shamir-Adleman (RSA) certificate authentication method (not the RSA key exchange algorithm) consumes more resources than Elliptic Curve Digital Signature Algorithm (ECDSA), but ECDSA is more secure.
Answer:
A, CExplanation:
When planning a firewall deployment with SSL/TLS decryption enabled, it is crucial to consider the additional processing overhead introduced by decrypting and inspecting encrypted traffic. Here are the details for each statement:
Why " SSL decryption traffic amounts vary from network to network " (Correct Answer A)? SSL decryption traffic varies depending on the organization’s specific network environment, user behavior, and applications. For example, networks with heavy web traffic, cloud applications, or encrypted VoIP traffic will have more SSL/TLS decryption processing requirements. This variability means each deployment must be properly assessed and sized accordingly.
Why " Perfect Forward Secrecy (PFS) ephemeral key exchange algorithms such as Diffie-Hellman Ephemeral (DHE) and Elliptic-Curve Diffie-Hellman Exchange (ECDHE) consume more processing resources than Rivest-Shamir-Adleman (RSA) algorithms " (Correct Answer C)? PFS algorithms like DHE and ECDHE generate unique session keys for each connection, ensuring better security but requiring significantly more processing power compared to RSA key exchange. When decryption is enabled, firewalls must handle these computationally expensive operations for every encrypted session, impacting performance and sizing requirements.
Why not " Large average transaction sizes consume more processing power to decrypt " (Option B)? While large transaction sizes can consume additional resources, SSL/TLS decryption is more dependent on the number of sessions and the complexity of the encryption algorithms used, rather than the size of the transactions. Hence, this is not a primary best practice consideration.
Why not " Rivest-Shamir-Adleman (RSA) certificate authentication method consumes more resources than Elliptic Curve Digital Signature Algorithm (ECDSA), but ECDSA is more secure " (Option D)? This statement discusses certificate authentication methods, not SSL/TLS decryption performance. While ECDSA is more efficient and secure than RSA, it is not directly relevant to sizing considerations for firewall deployments with decryption enabled.
As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: " Customer is struggling with security as they move to cloud apps and remote users. " What should the SE recommend to the team in preparation for the meeting?
Options:
Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team ' s approach meets their needs.
Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.
Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.
Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.
Answer:
BExplanation:
When preparing for a customer meeting, it’s important to understand their specific challenges and align solutions accordingly. The notes suggest that the customer is facing difficulties securing their cloud apps and remote users, which are core areas addressed by Palo Alto Networks’ Zero Trust and SASE solutions. However, jumping directly into a pitch or product demonstration without validating the customer ' s specific challenges may fail to build trust or fully address their needs.
Option A: Leading with a pre-structured pitch about Zero Trust principles may not resonate with the customer if their challenges are not fully understood first. The team needs to gather insights into the customer ' s security pain points before presenting a solution.
Option B (Correct): Discovery questions are a critical step in the sales process, especially when addressing complex topics like Zero Trust. By designing targeted questions about the customer’s challenges with identity, devices, data, and access, the SE can identify specific pain points. These insights can then be used to tailor a Zero Trust strategy that directly addresses the customer’s concerns. This approach ensures the meeting is customer-focused and demonstrates that the SE understands their unique needs.
Option C: While a product demonstration of GlobalProtect, Prisma Access, and SaaS security is valuable, it should come after discovery. Presenting products prematurely may seem like a generic sales pitch and could fail to address the customer’s actual challenges.
Option D: Prisma SASE is an excellent solution for addressing cloud security and remote user challenges, but recommending it without first understanding the customer’s specific needs may undermine trust. This step should follow after discovery and validation of the customer’s pain points.
Examples of Discovery Questions:
What are your primary security challenges with remote users and cloud applications?
Are you currently able to enforce consistent security policies across your hybrid environment?
How do you handle identity verification and access control for remote users?
What level of visibility do you have into traffic to and from your cloud applications?
A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?
Options:
Use the " Monitor > PDF Reports " node to schedule a weekly email of the Zero Trust report to the internal management team.
Help the customer build reports that align to their Zero Trust plan in the " Monitor > Manage Custom Reports " tab.
Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer ' s needs.
Use the " ACC " tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.
Answer:
BExplanation:
To demonstrate compliance with Zero Trust principles, a systems engineer can leverage the rich reporting and logging capabilities of Palo Alto Networks firewalls. The focus should be on creating reports that align with the customer ' s Zero Trust strategy, providing detailed insights into policy enforcement, user activity, and application usage.
Option A: Scheduling a pre-built PDF report does not offer the flexibility to align the report with the customer’s specific Zero Trust plan. While useful for automated reporting, this option is too generic for demonstrating Zero Trust compliance.
Option B (Correct): Custom reports in the " Monitor > Manage Custom Reports " tab allow the customer to build tailored reports that align with their Zero Trust plan. These reports can include granular details such as application usage, user activity, policy enforcement logs, and segmentation compliance. This approach ensures the customer can present evidence directly related to their Zero Trust implementation.
Option C: Using a third-party tool is unnecessary as Palo Alto Networks NGFWs already have built-in capabilities to log, report, and demonstrate policy enforcement. This option adds complexity and may not fully leverage the native capabilities of the NGFW.
Option D: The Application Command Center (ACC) is useful for visualizing traffic and historical data but is not a reporting tool. While it can complement custom reports, it is not a substitute for generating Zero Trust-specific compliance reports.
Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer ' s business when they show interest in adopting Zero Trust? (Choose two.)
Options:
Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure.
Explain how Palo Alto Networks can place virtual NGFWs across the customer ' s network to ensure assets and traffic are seen and controlled.
Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust.
Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase.
Answer:
A, DExplanation:
To help a customer understand how Palo Alto Networks can bring value when adopting a Zero Trust architecture, the systems engineer must focus on understanding the customer ' s specific needs and explaining how the Zero Trust strategy aligns with their business goals. Here’s the detailed analysis of each option:
Option A: Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure
Understanding the customer ' s internal workflows and how their users interact with applications and data is a critical first step in Zero Trust. This information allows the systems engineer to identify potential security gaps and suggest tailored solutions.
This is correct.
Option B: Explain how Palo Alto Networks can place virtual NGFWs across the customer ' s network to ensure assets and traffic are seen and controlled
While placing NGFWs across the customer ' s network may be part of the implementation, this approach focuses on the product rather than the customer ' s strategy. Zero Trust is more about policies and architecture than specific product placement.
This is incorrect.
Option C: Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust
While demonstrating capabilities is valuable during the later stages of engagement, the initial focus should be on understanding the customer ' s business requirements rather than showcasing products.
This is incorrect.
Option D: Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase
Zero Trust is not a product but a strategy that requires a shift in mindset. By discussing their approach, the systems engineer can identify whether the customer understands Zero Trust principles and guide them accordingly.
This is correct.
Device-ID can be used in which three policies? (Choose three.)
Options:
Security
Decryption
Policy-based forwarding (PBF)
SD-WAN
Quality of Service (QoS)
Answer:
A, B, EExplanation:
The question asks about the policies where Device-ID, a feature of Palo Alto Networks NGFWs, can be applied. Device-ID enables the firewall to identify and classify devices (e.g., IoT, endpoints) based on attributes like device type, OS, or behavior, enhancing policy enforcement. Let’s evaluate its use across the specified policy types.
Step 1: Understand Device-ID
Device-ID leverages the IoT Security subscription and integrates with the Strata Firewall to provide device visibility and control. It uses data from sources like DHCP, HTTP headers, and machine learning to identify devices and allows policies to reference device objects (e.g., “IP Camera,” “Medical Device”). This feature is available on PA-Series firewalls running PAN-OS 10.0 or later with the appropriate license.
Which three known variables can assist with sizing an NGFW appliance? (Choose three.)
Options:
Connections per second
Max sessions
Packet replication
App-ID firewall throughput
Telemetry enabled
Answer:
A, B, DExplanation:
When sizing a Palo Alto Networks NGFW appliance, it ' s crucial to consider variables that affect its performance and capacity. These include the network ' s traffic characteristics, application requirements, and expected workloads. Below is the analysis of each option:
Option A: Connections per second
Connections per second (CPS) is a critical metric for determining how many new sessions the firewall can handle per second. High CPS requirements are common in environments with high traffic turnover, such as web servers or applications with frequent session terminations and creations.
This is an important sizing variable.
Option B: Max sessions
Max sessions represent the total number of concurrent sessions the firewall can support. For environments with a large number of users or devices, this metric is critical to prevent session exhaustion.
This is an important sizing variable.
Option C: Packet replication
Packet replication is used in certain configurations, such as TAP mode or port mirroring for traffic inspection. While it impacts performance, it is not a primary variable for firewall sizing as it is a specific use case.
This is not a key variable for sizing.
Option D: App-ID firewall throughput
App-ID throughput measures the firewall ' s ability to inspect traffic and apply policies based on application signatures. It directly impacts the performance of traffic inspection under real-world conditions.
This is an important sizing variable.
Option E: Telemetry enabled
While telemetry provides data for monitoring and analysis, enabling it does not significantly impact the sizing of the firewall. It is not a core variable for determining firewall performance or capacity.
This is not a key variable for sizing.
Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?
Options:
Best Practice Assessment (BPA)
Security Lifecycle Review (SLR)
Firewall Sizing Guide
Golden Images
Answer:
A, BExplanation:
After a customer has concluded an evaluation of Palo Alto Networks solutions, it is critical to provide a detailed analysis of the results and benefits gained during the evaluation. The following two tools are most appropriate:
Why " Best Practice Assessment (BPA) " (Correct Answer A)? The BPA evaluates the customer ' s firewall configuration against Palo Alto Networks ' recommended best practices. It highlights areas where the configuration could be improved to strengthen security posture. This is an excellent tool to showcase how adopting Palo Alto Networks ' best practices aligns with industry standards and improves security performance.
Why " Security Lifecycle Review (SLR) " (Correct Answer B)? The SLR provides insights into the customer ' s security environment based on data collected during the evaluation. It identifies vulnerabilities, risks, and malicious activities observed in the network and demonstrates how Palo Alto Networks ' solutions can address these issues. SLR reports use clear visuals and metrics, making it easier to showcase the benefits of the evaluation.
Why not " Firewall Sizing Guide " (Option C)? The Firewall Sizing Guide is a pre-sales tool used to recommend the appropriate firewall model based on the customer ' s network size, performance requirements, and other criteria. It is not relevant for showcasing the benefits of an evaluation.
Why not " Golden Images " (Option D)? Golden Images refer to pre-configured templates for deploying firewalls in specific use cases. While useful for operational efficiency, they are not tools for demonstrating the outcomes or benefits of a customer evaluation.
Which statement appropriately describes performance tuning Intrusion Prevention System (IPS) functions on a Palo Alto Networks NGFW running Advanced Threat Prevention?
Options:
Leave all signatures turned on because they do not impact performance.
Create a new threat profile to use only signatures needed for the environment.
Work with TAC to run a debug and receive exact measurements of performance utilization for the IPS.
To increase performance, disable any threat signatures that do not apply to the environment.
Answer:
BExplanation:
Create a New Threat Profile (Answer B):
Performance tuning in Intrusion Prevention System (IPS) involves ensuring that only the most relevant and necessary signatures are enabled for the specific environment.
Palo Alto Networks allows you to create custom threat profiles to selectively enable signatures that match the threats most likely to affect the environment. This reduces unnecessary resource usage and ensures optimal performance.
By tailoring the signature set, organizations can focus on real threats without impacting overall throughput and latency.
Why Not A:
Leaving all signatures turned on is not a best practice because it may consume excessive resources, increasing processing time and degrading firewall performance, especially in high-throughput environments.
Why Not C:
While working with TAC for debugging may help identify specific performance bottlenecks, it is not a recommended approach for routine performance tuning. Instead, proactive configuration changes, such as creating tailored threat profiles, should be made.
Why Not D:
Disabling irrelevant threat signatures can improve performance, but this task is effectively accomplished by creating a new threat profile . Manually disabling signatures one by one is not scalable or efficient.
References from Palo Alto Networks Documentation:
Threat Prevention Best Practices
Custom Threat Profile Configuration
Which two actions should a systems engineer take when a customer is concerned about how to remain aligned to Zero Trust principles as they adopt additional security features over time? (Choose two)
Options:
Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies.
Apply decryption where possible to inspect and log all new and existing traffic flows.
Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles.
Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption.
Answer:
B, CExplanation:
When adopting additional security features over time, remaining aligned with Zero Trust principles requires a focus on constant visibility, control, and adherence to best practices. The following actions are the most relevant:
Why " Apply decryption where possible to inspect and log all new and existing traffic flows " (Correct Answer B)? Zero Trust principles emphasize visibility into all traffic, whether encrypted or unencrypted. Without decryption, encrypted traffic becomes a blind spot, which attackers can exploit. By applying decryption wherever feasible, organizations ensure they can inspect, log, and enforce policies on encrypted traffic, thus adhering to Zero Trust principles.
Why " Use the Best Practice Assessment (BPA) tool to measure progress toward Zero Trust principles " (Correct Answer C)? The BPA tool provides detailed insights into the customer’s security configuration, helping measure alignment with Palo Alto Networks’ Zero Trust best practices. It identifies gaps in security posture and recommends actionable steps to strengthen adherence to Zero Trust principles over time.
Why not " Turn on all licensed Cloud-Delivered Security Services (CDSS) subscriptions in blocking mode for all policies " (Option A)? While enabling CDSS subscriptions (like Threat Prevention, URL Filtering, Advanced Threat Prevention) in blocking mode can enhance security, it is not an action specifically tied to maintaining alignment with Zero Trust principles. A more holistic approach, such as decryption and BPA analysis, is critical to achieving Zero Trust.
Why not " Use the Policy Optimizer tool to understand security rules allowing users to bypass decryption " (Option D)? Policy Optimizer is used to optimize existing security rules by identifying unused or overly permissive policies. While useful, it does not directly address alignment with Zero Trust principles or help enforce decryption.
Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)
Options:
Payment Card Industry (PCI)
National Institute of Standards and Technology (NIST)
Center for Internet Security (CIS)
Health Insurance Portability and Accountability Act (HIPAA)
Answer:
A, BExplanation:
Step 1: Understanding Strata Cloud Manager (SCM) Premium
Strata Cloud Manager is a unified management interface for Strata NGFWs, Prisma Access, and other Palo Alto Networks solutions. The Premium version (subscription-based) includes advanced features like:
AIOps Premium : Predictive analytics, capacity planning, and compliance reporting.
Compliance Posture Management : Pre-built dashboards and reports for specific regulatory frameworks.
Compliance frameworks in SCM Premium provide visibility into adherence to standards like PCI DSS and NIST, generating actionable insights and audit-ready reports based on firewall configurations, logs, and traffic data.
There are no Advanced Threat Prevention log events in a company ' s SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.
Which action should the systems administrator take next?
Options:
Enable the company ' s Threat Prevention license.
Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company ' s SIEM instance.
Have the SIEM vendor troubleshoot its software.
Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.
Answer:
DExplanation:
Understanding the Problem:
The issue is that Advanced Threat Prevention (ATP) logs are visible on the firewall but are not being ingested into the company’s SIEM.
This implies that the ATP subscription is working and generating logs on the firewall but the logs are not being forwarded properly to the SIEM.
Action to Resolve:
Log Forwarding Configuration:
Verify that the Security policy rules configured to inspect traffic using Advanced Threat Prevention are set to forward logs to the SIEM instance.
This is a common oversight. Even if the logs are generated locally, they will not be forwarded unless explicitly configured.
Configuration steps to verify in the Palo Alto Networks firewall:
Go to Policies > Security Policies and check the " Log Forwarding " profile applied.
Ensure the " Log Forwarding " profile includes the correct settings to forward Threat Logs to the SIEM.
Go to Device > Log Settings and ensure the firewall is set to forward Threat logs to the desired Syslog or SIEM destination.
Why Not the Other Options?
A (Enable the Threat Prevention license):
The problem does not relate to the license; the administrator already confirmed the license is active.
B (Check with the SIEM vendor):
While verifying SIEM functionality is important, the first step is to ensure the logs are being forwarded correctly from the firewall to the SIEM. This is under the systems administrator’s control.
C (Have the SIEM vendor troubleshoot):
This step should only be taken after confirming the logs are forwarded properly from the firewall.
References from Palo Alto Networks Documentation:
Log Forwarding and Security Policy Configuration
Advanced Threat Prevention Configuration Guide
