시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / PSE-Strata-Pro-24 덤프  / PSE-Strata-Pro-24 문제 연습

Paloalto Networks PSE-Strata-Pro-24 시험

Palo Alto Networks Systems Engineer Professional - Hardware Firewall 온라인 연습

최종 업데이트 시간: 2025년06월06일

당신은 온라인 연습 문제를 통해 Paloalto Networks PSE-Strata-Pro-24 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 PSE-Strata-Pro-24 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 60개의 시험 문제와 답을 포함하십시오.

 / 2

Question No : 1


As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: "Customer is struggling with security as they move to cloud apps and remote users."
What should the SE recommend to the team in preparation for the meeting?

정답:
Explanation:
When preparing for a customer meeting, it’s important to understand their specific challenges and align solutions accordingly. The notes suggest that the customer is facing difficulties securing their cloud apps and remote users, which are core areas addressed by Palo Alto Networks’ Zero Trust and SASE solutions. However, jumping directly into a pitch or product demonstration without validating the customer's specific challenges may fail to build trust or fully address their needs.
Option A: Leading with a pre-structured pitch about Zero Trust principles may not resonate with the customer if their challenges are not fully understood first. The team needs to gather insights into the customer's security pain points before presenting a solution.
Option B (Correct): Discovery questions are a critical step in the sales process, especially when addressing complex topics like Zero Trust. By designing targeted questions about the customer’s challenges with identity, devices, data, and access, the SE can identify specific pain points. These insights can then be used to tailor a Zero Trust strategy that directly addresses the customer’s concerns. This approach ensures the meeting is customer-focused and demonstrates that the SE understands their unique needs.
Option C: While a product demonstration of GlobalProtect, Prisma Access, and SaaS security is valuable, it should come after discovery. Presenting products prematurely may seem like a generic sales pitch and could fail to address the customer’s actual challenges.
Option D: Prisma SASE is an excellent solution for addressing cloud security and remote user challenges, but recommending it without first understanding the customer’s specific needs may undermine trust. This step should follow after discovery and validation of the customer’s pain points.
Examples of Discovery Questions:
What are your primary security challenges with remote users and cloud applications?
Are you currently able to enforce consistent security policies across your hybrid environment?
How do you handle identity verification and access control for remote users?
What level of visibility do you have into traffic to and from your cloud applications?
Reference: Palo Alto Networks Zero Trust Overview: https://www.paloaltonetworks.com/zero-trust
Best Practices for Customer Discovery: https://docs.paloaltonetworks.com/sales-playbooks

Question No : 2


A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers.
How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

정답:
Explanation:
When high traffic from Palo Alto Networks NGFWs to Active Directory servers causes performance issues, optimizing the way NGFWs gather user-to-IP mappings is critical. Palo Alto Networks offers multiple ways to collect user identity information, and Cloud Identity Engine provides a solution that reduces the load on AD servers while still ensuring efficient and accurate mapping.
Option A (Correct): Cloud Identity Engine allows NGFWs to gather user-to-IP mappings directly from Active Directory authentication logs or other identity sources without placing heavy traffic on the AD servers. By leveraging this feature, the NGFW can offload authentication-related tasks and efficiently identify users without overloading AD servers. This solution is scalable and minimizes the overhead typically caused by frequent User-ID queries to AD servers.
Option B: Using GlobalProtect Windows SSO to gather user information can add complexity and is not the most efficient solution for this problem. It requires all users to install GlobalProtect agents, which may not be feasible in all environments and can introduce operational challenges.
Option C: Data redistribution involves redistributing user-to-IP mappings from one NGFW (hub) to other NGFWs (spokes). While this can reduce the number of queries sent to AD servers, it assumes the mappings are already being collected from AD servers by the hub, which means the performance issue on the AD servers would persist.
Option D: Using GlobalProtect agents to gather user information is a valid method for environments where GlobalProtect is already deployed, but it is not the most efficient or straightforward solution for the given problem. It also introduces dependencies on agent deployment, configuration, and management.
How to Implement Cloud Identity Engine for User-ID Mapping:
Enable Cloud Identity Engine from the Palo Alto Networks console.
Integrate the Cloud Identity Engine with the AD servers to allow it to retrieve authentication logs directly.
Configure the NGFWs to use the Cloud Identity Engine for User-ID mappings instead of querying the AD servers directly.
Monitor performance to ensure the AD servers are no longer overloaded, and mappings are being retrieved efficiently.
Reference: Cloud Identity Engine Overview: https://docs.paloaltonetworks.com/cloud-identity
User-ID Best Practices: https://docs.paloaltonetworks.com

Question No : 3


A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles.
Which action should the SE take?

정답:
Explanation:
To demonstrate compliance with Zero Trust principles, a systems engineer can leverage the rich reporting and logging capabilities of Palo Alto Networks firewalls. The focus should be on creating reports that align with the customer's Zero Trust strategy, providing detailed insights into policy enforcement, user activity, and application usage.
Option A: Scheduling a pre-built PDF report does not offer the flexibility to align the report with the customer’s specific Zero Trust plan. While useful for automated reporting, this option is too generic for demonstrating Zero Trust compliance.
Option B (Correct): Custom reports in the "Monitor > Manage Custom Reports" tab allow the customer to build tailored reports that align with their Zero Trust plan. These reports can include granular details such as application usage, user activity, policy enforcement logs, and segmentation compliance. This approach ensures the customer can present evidence directly related to their Zero Trust implementation.
Option C: Using a third-party tool is unnecessary as Palo Alto Networks NGFWs already have built-in capabilities to log, report, and demonstrate policy enforcement. This option adds complexity and may not fully leverage the native capabilities of the NGFW.
Option D: The Application Command Center (ACC) is useful for visualizing traffic and historical data but is not a reporting tool. While it can complement custom reports, it is not a substitute for generating Zero Trust-specific compliance reports.
Reference: Managing Reports in PAN-OS: https://docs.paloaltonetworks.com
Zero Trust Monitoring and Reporting Best Practices: https://www.paloaltonetworks.com/zero-trust

Question No : 4


Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)

정답:
Explanation:
CN-Series firewalls are Palo Alto Networks’ containerized NGFWs designed for protecting Kubernetes environments. These firewalls provide threat prevention, traffic inspection, and compliance enforcement within containerized workloads. Deploying CN-Series in a Kubernetes cluster requires specific configuration files to set up the management plane and NGFW functionalities.
Option A (Correct): PAN-CN-NGFW-CONFIG is required to define the configurations for the NGFW itself. This file contains firewall policies, application configurations, and security profiles needed to secure the Kubernetes environment.
Option B (Correct): PAN-CN-MGMT-CONFIGMAP is a ConfigMap file that contains the configuration for the management plane of the CN-Series firewall. It helps set up the connection between the management interface and the NGFW deployed within the Kubernetes cluster.
Option C: This option does not represent a valid or required file for deploying CN-Series firewalls. The management configurations are handled via the ConfigMap.
Option D: PAN-CNI-MULTUS refers to the Multus CNI plugin for Kubernetes, which is used for enabling multiple network interfaces in pods. While relevant for Kubernetes networking, it is not specific to deploying CN-Series firewalls.
Reference: CN-Series Deployment Guide: https://docs.paloaltonetworks.com/cn-series
Kubernetes Integration with CN-Series Firewalls: https://www.paloaltonetworks.com

Question No : 5


While responding to a customer RFP, a systems engineer (SE) is presented the question, "How do PANW firewalls enable the mapping of transactions as part of Zero Trust principles?"
Which two narratives can the SE use to respond to the question? (Choose two.)

정답:
Explanation:
Zero Trust is a strategic framework for securing infrastructure and data by eliminating implicit trust and continuously validating every stage of digital interaction. Palo Alto Networks NGFWs are designed with native capabilities to align with Zero Trust principles, such as monitoring transactions, validating identities, and enforcing least-privilege access.
The following narratives effectively address the customer’s question:
Option A: While emphasizing Zero Trust as an ideology is accurate, this response does not directly explain how Palo Alto Networks firewalls facilitate mapping of transactions. It provides context but is insufficient for addressing the technical aspect of the question.
Option B: Decryption and security protections are important for identifying malicious traffic, but they are not specific to mapping transactions within a Zero Trust framework. This response focuses on a subset of security functions rather than the broader concept of visibility and policy enforcement.
Option C (Correct): Placing the NGFW in the network provides visibility into every traffic flow across users, devices, and applications. This allows the firewall to map transactions and enforce Zero Trust principles such as segmenting networks, inspecting all traffic, and controlling access. With features like App-ID, User-ID, and Content-ID, the firewall provides granular insights into traffic flows, making it easier to identify and secure transactions.
Option D (Correct): Palo Alto Networks NGFWs use security policies based on users, applications, and data objects to align with Zero Trust principles. Instead of relying on IP addresses or ports, policies are enforced based on the application’s behavior, the identity of the user, and the sensitivity of the data involved. This mapping ensures that only authorized users can access specific resources, which is a cornerstone of Zero Trust.
Reference: Zero Trust Framework: https://www.paloaltonetworks.com/solutions/zero-trust
Security Policy Best Practices for Zero Trust: https://docs.paloaltonetworks.com

Question No : 6


A customer sees unusually high DNS traffic to an unfamiliar IP address.
Which Palo Alto Networks Cloud-Delivered Security Services (CDSS) subscription should be enabled to further inspect this traffic?

정답:
Explanation:
The appropriate CDSS subscription to inspect and mitigate suspicious DNS traffic is Advanced DNS Security.
Here’s why:
Advanced DNS Security protects against DNS-based threats, including domain generation algorithms (DGA), DNS tunneling (often used for data exfiltration), and malicious domains used in attacks. It leverages machine learning to detect and block DNS traffic associated with command-and-control servers or other malicious activities. In this case, unusually high DNS traffic to an unfamiliar IP address is likely indicative of a DNS-based attack or malware activity, making this the most suitable service.
Option A: Advanced Threat Prevention (ATP) focuses on identifying and blocking sophisticated threats in network traffic, such as exploits and evasive malware. While it complements DNS Security, it does not specialize in analyzing DNS-specific traffic patterns.
Option B: Advanced WildFire focuses on detecting and preventing file-based threats, such as malware delivered via email attachments or web downloads. It does not provide specific protection for DNS-related anomalies.
Option C: Advanced URL Filtering is designed to prevent access to malicious or inappropriate websites based on their URLs. While DNS may be indirectly involved in resolving malicious websites, this service does not directly inspect DNS traffic patterns for threats.
Option D (Correct): Advanced DNS Security specifically addresses DNS-based threats. By enabling this service, the customer can detect and block DNS queries to malicious domains and investigate anomalous DNS behavior like the high traffic observed in this scenario.
How to Enable Advanced DNS Security:
Ensure the firewall has a valid Advanced DNS Security license.
Navigate to Objects > Security Profiles > Anti-Spyware.
Enable DNS Security under the "DNS Signatures" section.
Apply the Anti-Spyware profile to the relevant Security Policy to enforce DNS Security.
Reference: Palo Alto Networks Advanced DNS Security Overview: https://www.paloaltonetworks.com/dns-security
Best Practices for DNS Security Configuration.

Question No : 7


Which three descriptions apply to a perimeter firewall? (Choose three.)

정답:
Explanation:
A perimeter firewall is traditionally deployed at the boundary of a network to protect it from external threats. It provides a variety of protections, including blocking unauthorized access, inspecting traffic flows, and safeguarding sensitive resources.
Here is how the options apply:
Option A (Correct): Perimeter firewalls provide network layer protection by filtering and inspecting traffic entering or leaving the network at the outer edge. This is one of their primary roles.
Option B: Power utilization is not a functional or architectural aspect of a firewall and is irrelevant when describing the purpose of a perimeter firewall.
Option C: Securing east-west traffic is more aligned with data center firewalls, which monitor lateral (east-west) movement of traffic within a virtualized or segmented environment. A perimeter firewall focuses on north-south traffic instead.
Option D (Correct): A perimeter firewall primarily secures north-south traffic, which refers to traffic entering and leaving the network. It ensures that inbound and outbound traffic adheres to security policies.
Option E (Correct): Perimeter firewalls play a critical role in guarding against external attacks, such as DDoS attacks, malicious IP traffic, and other unauthorized access attempts.
Reference: Palo Alto Networks Firewall Deployment Use Cases: https://docs.paloaltonetworks.com Security Reference Architecture for North-South Traffic Control.

Question No : 8


An existing customer wants to expand their online business into physical stores for the first time. The customer requires NGFWs at the physical store to handle SD-WAN, security, and data protection needs, while also mandating a vendor-validated deployment method.
Which two steps are valid actions for a systems engineer to take? (Choose two.)

정답:
Explanation:
When assisting a customer in deploying next-generation firewalls (NGFWs) for their new physical store branches, it is crucial to address their requirements for SD-WAN, security, and data protection with a validated deployment methodology. Palo Alto Networks provides robust solutions for branch security and SD-WAN integration, and several steps align with vendor-validated methods:
Option A (Correct): Palo Alto Networks or certified partners provide professional services for validated deployment methods, including SD-WAN, security, and data protection in branch locations. Professional services ensure that the deployment adheres to industry best practices and Palo Alto’s validated reference architectures. This ensures a scalable and secure deployment across all branch locations.
Option B: While using Golden Images and a Day 1 configuration can create a consistent baseline for configuration deployment, it does not align directly with the requirement of following vendor-validated deployment methodologies. This step is helpful but secondary to vendor-validated professional services and bespoke deployment planning.
Option C (Correct): A bespoke deployment plan considers the customer's specific architecture, store footprint, and unique security requirements. Palo Alto Networks’ system engineers typically collaborate with the customer to design and validate tailored deployments, ensuring alignment with the customer’s operational goals while maintaining compliance with validated architectures.
Option D: While Palo Alto Networks provides branch deployment guides (such as the "On-Premises Network Security for the Branch Deployment Guide"), these guides are primarily reference materials. They do not substitute for vendor-provided professional services or the creation of tailored deployment plans with the customer.
Reference: Palo Alto Networks SD-WAN Deployment Guide.
Branch Deployment Architecture Best Practices: https://docs.paloaltonetworks.com
Professional Services Overview: https://www.paloaltonetworks.com/services

Question No : 9


Regarding APIs, a customer RFP states: "The vendor’s firewall solution must provide an API with an enforcement mechanism to deactivate API keys after two hours."
How should the response address this clause?

정답:
Explanation:
Palo Alto Networks' PAN-OS supports API keys for authentication when interacting with the firewall’s RESTful and XML-based APIs. By default, API keys do not have an expiration time set, but the expiration time for API keys can be configured by an administrator to meet specific requirements, such as a time-based deactivation after two hours. This is particularly useful for compliance and security purposes, where API keys should not remain active indefinitely.
Here’s an evaluation of the options:
Option A: This is incorrect because the default setting for API keys does not include an expiration time. By default, API keys are valid indefinitely unless explicitly configured otherwise.
Option B: This is incorrect because PAN-OS fully supports API keys. The API keys are integral to managing access to the firewall's APIs and provide a secure method for authentication.
Option C: This is incorrect because PAN-OS does support API key expiration when explicitly configured. While the default is "no expiration," the feature to configure an expiration time (e.g., 2 hours) is available.
Option D (Correct): The correct response to the RFP clause is that the default API key settings need to be modified to set the expiration time to 120 minutes (2 hours). This aligns with the customer requirement to enforce API key deactivation based on time. Administrators can configure this using the PAN-OS management interface or the CLI.
How to Configure API Key Expiration (Steps):
Access the Web Interface or CLI on the firewall.
Navigate to Device > Management > API Key Lifetime Settings (on the GUI).
Set the desired expiration time (e.g., 120 minutes).
Alternatively, use the CLI to configure the API key expiration:
set deviceconfig system api-key-expiry <time-in-minutes> commit
Verify the configuration using the show command or by testing API calls to ensure the key expires after the set duration.
Reference: Palo Alto Networks API Documentation: https://docs.paloaltonetworks.com/apis
Configuration Guide: Managing API Key Expiration

Question No : 10


Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?

정답:
Explanation:
To prevent malicious actors from abusing file-sharing applications for data exfiltration, App-ID provides a granular approach to managing application traffic. Palo Alto Networks' App-ID is a technology that identifies applications traversing the network, regardless of port, protocol, encryption (SSL), or evasive tactics. By leveraging App-ID, security engineers can implement policies that restrict the use of specific applications or functionalities based on job functions, ensuring that only authorized users or groups can use file-sharing applications while blocking unauthorized or malicious usage.
Here’s why the options are evaluated this way:
Option A: DNS Security focuses on identifying and blocking malicious domains. While it plays a critical role in preventing certain attacks (like command-and-control traffic), it is not effective for managing application usage. Hence, this is not the best approach.
Option B (Correct): App-ID provides the ability to identify file-sharing applications (such as Dropbox, Google Drive, or OneDrive) and enforce policies to restrict their use. For example, you can create a security rule allowing file-sharing apps only for specific job functions, such as HR or marketing, while denying them for other users. This targeted approach ensures legitimate business needs are not disrupted, which aligns with the requirement of not impacting valid users.
Option C: Blocking all file-sharing applications outright using DNS Security is a broad measure that will indiscriminately impact legitimate users. This does not meet the requirement of allowing specific users to continue using file-sharing applications.
Option D: While App-ID can block file-sharing applications outright, doing so will prevent legitimate usage and is not aligned with the requirement to allow usage based on job functions.
How to Implement the Solution (Using App-ID):
Identify the relevant file-sharing applications using App-ID in Palo Alto Networks’ predefined application database.
Create security policies that allow these applications only for users or groups defined in your directory (e.g., Active Directory).
Use custom App-ID filters or explicit rules to control specific functionalities of file-sharing applications, such as uploads or downloads.
Monitor traffic to ensure that only authorized users are accessing the applications and that no malicious activity is occurring.
Reference: Palo Alto Networks Admin Guide: Application Identification and Usage Policies.
Best Practices for App-ID Configuration: https://docs.paloaltonetworks.com

Question No : 11


A large global company plans to acquire 500 NGFWs to replace its legacy firewalls and has a specific requirement for centralized logging and reporting capabilities.
What should a systems engineer recommend?

정답:
Explanation:
A large deployment of 500 firewalls requires a scalable, centralized logging and reporting infrastructure.
Here's the analysis of each option:
Option A: Combine Panorama for firewall management with Palo Alto Networks' cloud-based Strata Logging Service to offer scalability for the company's logging and reporting infrastructure
The Strata Logging Service (or Cortex Data Lake) is a cloud-based solution that offers massive scalability for logging and reporting. Combined with Panorama, it allows for centralized log collection, analysis, and policy management without the need for extensive on-premises infrastructure.
This approach is ideal for large-scale environments like the one described in the scenario, as it ensures cost-effectiveness and scalability.
This is the correct recommendation.
Option B: Use Panorama for firewall management and to transfer logs from the 500 firewalls directly to a third-party SIEM for centralized logging and reporting
While third-party SIEM solutions can be integrated with Palo Alto Networks NGFWs, directly transferring logs from 500 firewalls to a SIEM can lead to bottlenecks and scalability issues. Furthermore, relying on third-party solutions may not provide the same level of native integration as the Strata Logging Service.
This is not the ideal recommendation.
Option C: Highlight the efficiency of PAN-OS, which employs AI to automatically extract critical logs and generate daily executive reports, and confirm that the purchase of 500 NGFWs is sufficient
While PAN-OS provides AI-driven insights and reporting, this option does not address the requirement for centralized logging and reporting. It also dismisses the need for additional infrastructure to handle logs from 500 firewalls.
This is incorrect.
Option D: Deploy a pair of M-1000 log collectors in the customer data center, and route logs from all 500 firewalls to the log collectors for centralized logging and reporting
The M-1000 appliance is an on-premises log collector, but it has limitations in terms of scalability and storage capacity when compared to cloud-based options like the Strata Logging Service. Deploying only two M-1000 log collectors for 500 firewalls would result in potential performance and storage challenges.
This is not the best recommendation.
Reference: Palo Alto Networks documentation on Panorama
Strata Logging Service (Cortex Data Lake) overview in Palo Alto Networks Docs

Question No : 12


Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer's business when they show interest in adopting Zero Trust? (Choose two.)

정답:
Explanation:
To help a customer understand how Palo Alto Networks can bring value when adopting a Zero Trust architecture, the systems engineer must focus on understanding the customer's specific needs and explaining how the Zero Trust strategy aligns with their business goals.
Here’s the detailed analysis of each option:
Option A: Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure
Understanding the customer's internal workflows and how their users interact with applications and
data is a critical first step in Zero Trust. This information allows the systems engineer to identify potential security gaps and suggest tailored solutions.
This is correct.
Option B: Explain how Palo Alto Networks can place virtual NGFWs across the customer's network to ensure assets and traffic are seen and controlled
While placing NGFWs across the customer's network may be part of the implementation, this approach focuses on the product rather than the customer's strategy. Zero Trust is more about policies and architecture than specific product placement.
This is incorrect.
Option C: Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust
While demonstrating capabilities is valuable during the later stages of engagement, the initial focus should be on understanding the customer's business requirements rather than showcasing products.
This is incorrect.
Option D: Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase
Zero Trust is not a product but a strategy that requires a shift in mindset. By discussing their approach, the systems engineer can identify whether the customer understands Zero Trust principles and guide them accordingly.
This is correct.
Reference: Palo Alto Networks documentation on Zero Trust
Zero Trust Architecture Principles in NIST 800-207

Question No : 13


The PAN-OS User-ID integrated agent is included with PAN-OS software and comes in which two forms? (Choose two.)

정답:
Explanation:
User-ID is a feature in PAN-OS that maps IP addresses to usernames by integrating with various directory services (e.g., Active Directory). User-ID can be implemented through agents provided by Palo Alto Networks.
Here’s how each option applies:
Option A: Integrated agent
The integrated User-ID agent is built into PAN-OS and does not require an external agent installation. It is configured directly on the firewall and integrates with directory services to retrieve user information.
This is correct.
Option B: GlobalProtect agent
GlobalProtect is Palo Alto Networks' VPN solution and does not function as a User-ID agent. While it can be used to authenticate users and provide visibility, it is not categorized as a User-ID agent.
This is incorrect.
Option C: Windows-based agent
The Windows-based User-ID agent is a standalone agent installed on a Windows server. It collects user mapping information from directory services and sends it to the firewall.
This is correct.
Option D: Cloud Identity Engine (CIE)
The Cloud Identity Engine provides identity services in a cloud-native manner but is not a User-ID agent. It synchronizes with identity providers like Azure AD and Okta.
This is incorrect.
Reference: Palo Alto Networks documentation on User-ID
Knowledge Base article on User-ID Agent Options

Question No : 14


Device-ID can be used in which three policies? (Choose three.)

정답:
Explanation:
Device-ID is a feature in Palo Alto Networks firewalls that identifies devices based on their unique attributes (e.g., MAC addresses, device type, operating system). Device-ID can be used in several policy types to provide granular control.
Here's how it applies to each option:
Option A: Security
Device-ID can be used in Security policies to enforce rules based on the device type or identity. For example, you can create policies that allow or block traffic for specific device types (e.g., IoT devices).
This is correct.
Option B: Decryption
Device-ID cannot be used in decryption policies. Decryption policies are based on traffic types, certificates, and other SSL/TLS attributes, not device attributes.
This is incorrect.
Option C: Policy-based forwarding (PBF)
Device-ID can be used in PBF policies to control the forwarding of traffic based on the identified device. For example, you can route traffic from certain device types through specific ISPs or VPN tunnels.
This is correct.
Option D: SD-WAN
SD-WAN policies use metrics such as path quality (e.g., latency, jitter) and application information for traffic steering. Device-ID is not a criterion used in SD-WAN policies.
This is incorrect.
Option E: Quality of Service (QoS)
Device-ID can be used in QoS policies to apply traffic shaping or bandwidth control for specific devices. For example, you can prioritize or limit bandwidth for traffic originating from IoT devices or specific endpoints.
This is correct.
Reference: Palo Alto Networks documentation on Device-ID

Question No : 15


A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.
Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

정답:
Explanation:
To configure GlobalProtect to authenticate users from multiple SAML identity providers (IdPs), the correct approach involves creating multiple authentication profiles, one for each IdP. Here's the analysis of each option:
Option A: GlobalProtect with multiple authentication profiles for each SAML IdP
GlobalProtect allows configuring multiple SAML authentication profiles, each corresponding to a specific IdP.
These profiles are associated with the GlobalProtect portal or gateway. When users attempt to authenticate, they can be directed to the appropriate IdP based on their domain or other attributes.
This is the correct approach to enable authentication for users from multiple IdPs.
Option B: Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways
The Cloud Identity Engine (CIE) can synchronize identities from multiple directories, but it does not directly support multiple SAML IdPs for a shared GlobalProtect setup.
This option is not applicable.
Option C: Authentication sequence that has multiple authentication profiles using different
authentication methods
Authentication sequences allow multiple authentication methods (e.g., LDAP, RADIUS, SAML) to be tried in sequence for the same user, but they are not designed for handling multiple SAML IdPs.
This option is not appropriate for the scenario.
Option D: Multiple Cloud Identity Engine tenants for each business unit
Deploying multiple CIE tenants for each business unit adds unnecessary complexity and is not required for configuring GlobalProtect to authenticate users to multiple SAML IdPs.
This option is not appropriate.

 / 2
Paloalto Networks