- Home
- Palo Alto Networks
- PSE-Strata-Pro-24
- PaloAltoNetworks.PSE-Strata-Pro-24.v2025-11-22.q24 Practice Test (Page 2)
PSE-Strata-Pro-24 Exam Question 1
What is used to stop a DNS-based threat?
Correct Answer: D
DNS-based threats, such as DNS tunneling, phishing, or malware command-and-control (C2) activities, are commonly used by attackers to exfiltrate data or establish malicious communications. Palo Alto Networks firewalls provide several mechanisms to address these threats, and the correct method is DNS sinkholing.
* Why "DNS sinkholing" (Correct Answer D)?DNS sinkholing redirects DNS queries for malicious domains to an internal or non-routable IP address, effectively preventing communication with malicious domains. When a user or endpoint tries to connect to a malicious domain, the sinkhole DNS entry ensures the traffic is blocked or routed to a controlled destination.
* DNS sinkholing is especially effective for blocking malware trying to contact its C2 server or preventing data exfiltration.
* Why not "DNS proxy" (Option A)?A DNS proxy is used to forward DNS queries from endpoints to an upstream DNS server. While it can be part of a network's DNS setup, it does not actively stop DNS- based threats.
* Why not "Buffer overflow protection" (Option B)?Buffer overflow protection is a method used to prevent memory-related attacks, such as exploiting software vulnerabilities. It is unrelated to DNS- based threat prevention.
* Why not "DNS tunneling" (Option C)?DNS tunneling is itself a type of DNS-based threat where attackers encode malicious traffic within DNS queries and responses. This option refers to the threat itself, not the method to stop it.
Reference: Palo Alto Networks DNS Security documentation confirms that DNS sinkholing is a key mechanism for stopping DNS-based threats.
* Why "DNS sinkholing" (Correct Answer D)?DNS sinkholing redirects DNS queries for malicious domains to an internal or non-routable IP address, effectively preventing communication with malicious domains. When a user or endpoint tries to connect to a malicious domain, the sinkhole DNS entry ensures the traffic is blocked or routed to a controlled destination.
* DNS sinkholing is especially effective for blocking malware trying to contact its C2 server or preventing data exfiltration.
* Why not "DNS proxy" (Option A)?A DNS proxy is used to forward DNS queries from endpoints to an upstream DNS server. While it can be part of a network's DNS setup, it does not actively stop DNS- based threats.
* Why not "Buffer overflow protection" (Option B)?Buffer overflow protection is a method used to prevent memory-related attacks, such as exploiting software vulnerabilities. It is unrelated to DNS- based threat prevention.
* Why not "DNS tunneling" (Option C)?DNS tunneling is itself a type of DNS-based threat where attackers encode malicious traffic within DNS queries and responses. This option refers to the threat itself, not the method to stop it.
Reference: Palo Alto Networks DNS Security documentation confirms that DNS sinkholing is a key mechanism for stopping DNS-based threats.
PSE-Strata-Pro-24 Exam Question 2
Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?
Correct Answer: C,D
After a customer has concluded an evaluation of Palo Alto Networks solutions, it is critical to provide a detailed analysis of the results and benefits gained during the evaluation. The following two tools are most appropriate:
* Why "Best Practice Assessment (BPA)" (Correct Answer A)?The BPA evaluates the customer's firewall configuration against Palo Alto Networks' recommended best practices. It highlights areas where the configuration could be improved to strengthen security posture. This is an excellent tool to showcase how adopting Palo Alto Networks' best practices aligns with industry standards and improves security performance.
* Why "Security Lifecycle Review (SLR)" (Correct Answer B)?The SLR provides insights into the customer's security environment based on data collected during the evaluation. It identifies vulnerabilities, risks, and malicious activities observed in the network and demonstrates how Palo Alto Networks' solutions can address these issues. SLR reports use clear visuals and metrics, making it easier to showcase the benefits of the evaluation.
* Why not "Firewall Sizing Guide" (Option C)?The Firewall Sizing Guide is a pre-sales tool used to recommend the appropriate firewall model based on the customer's network size, performance requirements, and other criteria. It is not relevant for showcasing the benefits of an evaluation.
* Why not "Golden Images" (Option D)?Golden Images refer to pre-configured templates for deploying firewalls in specific use cases. While useful for operational efficiency, they are not tools for demonstrating the outcomes or benefits of a customer evaluation.
Reference: Palo Alto Networks documentation for Best Practice Assessment (BPA) and Security Lifecycle Review (SLR) confirms their role in showcasing evaluation benefits.
* Why "Best Practice Assessment (BPA)" (Correct Answer A)?The BPA evaluates the customer's firewall configuration against Palo Alto Networks' recommended best practices. It highlights areas where the configuration could be improved to strengthen security posture. This is an excellent tool to showcase how adopting Palo Alto Networks' best practices aligns with industry standards and improves security performance.
* Why "Security Lifecycle Review (SLR)" (Correct Answer B)?The SLR provides insights into the customer's security environment based on data collected during the evaluation. It identifies vulnerabilities, risks, and malicious activities observed in the network and demonstrates how Palo Alto Networks' solutions can address these issues. SLR reports use clear visuals and metrics, making it easier to showcase the benefits of the evaluation.
* Why not "Firewall Sizing Guide" (Option C)?The Firewall Sizing Guide is a pre-sales tool used to recommend the appropriate firewall model based on the customer's network size, performance requirements, and other criteria. It is not relevant for showcasing the benefits of an evaluation.
* Why not "Golden Images" (Option D)?Golden Images refer to pre-configured templates for deploying firewalls in specific use cases. While useful for operational efficiency, they are not tools for demonstrating the outcomes or benefits of a customer evaluation.
Reference: Palo Alto Networks documentation for Best Practice Assessment (BPA) and Security Lifecycle Review (SLR) confirms their role in showcasing evaluation benefits.
PSE-Strata-Pro-24 Exam Question 3
A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and- control (C2) activities over port 53.
Which subscription(s) should the systems engineer recommend?
Which subscription(s) should the systems engineer recommend?
Correct Answer: B
Option C: It can be addressed with BGP confederations
Description: BGP confederations divide a single AS into sub-ASes (each with a private Confederation Member AS number), reducing the iBGP full-mesh requirement while maintaining a unified external AS.
Analysis:
How It Works:
Single AS (e.g., AS 65000) is split into sub-ASes (e.g., 65001, 65002).
Within each sub-AS, iBGP full mesh or route reflectors are used.
Between sub-ASes, eBGP-like peering (confederation EBGP) connects them, but externally, it appears as one AS.
Segregation:
Each sub-AS can represent a unique BGP environment (e.g., department, site) with its own routing policies.
Firewalls within a sub-AS peer via iBGP; across sub-ASes, they use confederation EBGP.
PAN-OS Support:
Configurable under "Network > Virtual Routers > BGP > Confederation" with a Confederation Member AS number.
Ideal for large internal networks needing segmentation without multiple public AS numbers.
Benefits:
Simplifies internal BGP management.
Aligns with the customer's need for unique internal BGP environments.
Verification:
"BGP confederations reduce full-mesh burden by dividing an AS into sub-ASes" (docs.paloaltonetworks.com
/pan-os/10-2/pan-os-networking-admin/bgp/bgp-confederations).
"Supports unique internal routing domains" (knowledgebase.paloaltonetworks.com).
Conclusion: Directly addresses the requirement with a supported, practical solution. Applicable.
Option D: It cannot be addressed because BGP must be fully meshed internally to work Analysis:
iBGP Full Mesh: Traditional iBGP requires all routers in an AS to peer with each other, scaling poorly (n(n-
1)/2 connections).
Mitigation: PAN-OS supports alternatives:
Route Reflectors: Centralize iBGP peering.
Confederations: Divide the AS into sub-ASes (see Option C).
This statement ignores these features, falsely claiming BGP's limitation prevents segregation.
Verification:
"Confederations and route reflectors eliminate full-mesh needs" (docs.paloaltonetworks.com/pan-os/10-2/pan- os-networking-admin/bgp/bgp-confederations).
Conclusion: Incorrect-PAN-OS overcomes full-mesh constraints. Not Applicable.
Step 3: Recommendation Justification
Why Option C?
Alignment: Confederations allow the internal network to be segregated into unique BGP environments (sub- ASes) while maintaining a single external AS, perfectly matching the customer's need.
Scalability: Reduces iBGP full-mesh complexity, ideal for large or segmented internal networks.
PAN-OS Support: Explicitly implemented in BGP configuration, validated by documentation.
Why Not Others?
A: False-PAN-OS supports BGP and segregation.
B: eBGP is for external ASes, not internal segregation; less practical than confederations.
D: Misrepresents BGP capabilities; full mesh isn't required with confederations or route reflectors.
Step 4: Verified References
BGP Confederations: "Divide an AS into sub-ASes for internal segmentation" (docs.paloaltonetworks.com
/pan-os/10-2/pan-os-networking-admin/bgp/bgp-confederations).
PAN-OS BGP: "Supports eBGP, iBGP, and confederations for routing flexibility" (paloaltonetworks.com, PAN-OS Networking Guide).
Use Case: "Confederations suit large internal networks" (knowledgebase.paloaltonetworks.com).
Description: BGP confederations divide a single AS into sub-ASes (each with a private Confederation Member AS number), reducing the iBGP full-mesh requirement while maintaining a unified external AS.
Analysis:
How It Works:
Single AS (e.g., AS 65000) is split into sub-ASes (e.g., 65001, 65002).
Within each sub-AS, iBGP full mesh or route reflectors are used.
Between sub-ASes, eBGP-like peering (confederation EBGP) connects them, but externally, it appears as one AS.
Segregation:
Each sub-AS can represent a unique BGP environment (e.g., department, site) with its own routing policies.
Firewalls within a sub-AS peer via iBGP; across sub-ASes, they use confederation EBGP.
PAN-OS Support:
Configurable under "Network > Virtual Routers > BGP > Confederation" with a Confederation Member AS number.
Ideal for large internal networks needing segmentation without multiple public AS numbers.
Benefits:
Simplifies internal BGP management.
Aligns with the customer's need for unique internal BGP environments.
Verification:
"BGP confederations reduce full-mesh burden by dividing an AS into sub-ASes" (docs.paloaltonetworks.com
/pan-os/10-2/pan-os-networking-admin/bgp/bgp-confederations).
"Supports unique internal routing domains" (knowledgebase.paloaltonetworks.com).
Conclusion: Directly addresses the requirement with a supported, practical solution. Applicable.
Option D: It cannot be addressed because BGP must be fully meshed internally to work Analysis:
iBGP Full Mesh: Traditional iBGP requires all routers in an AS to peer with each other, scaling poorly (n(n-
1)/2 connections).
Mitigation: PAN-OS supports alternatives:
Route Reflectors: Centralize iBGP peering.
Confederations: Divide the AS into sub-ASes (see Option C).
This statement ignores these features, falsely claiming BGP's limitation prevents segregation.
Verification:
"Confederations and route reflectors eliminate full-mesh needs" (docs.paloaltonetworks.com/pan-os/10-2/pan- os-networking-admin/bgp/bgp-confederations).
Conclusion: Incorrect-PAN-OS overcomes full-mesh constraints. Not Applicable.
Step 3: Recommendation Justification
Why Option C?
Alignment: Confederations allow the internal network to be segregated into unique BGP environments (sub- ASes) while maintaining a single external AS, perfectly matching the customer's need.
Scalability: Reduces iBGP full-mesh complexity, ideal for large or segmented internal networks.
PAN-OS Support: Explicitly implemented in BGP configuration, validated by documentation.
Why Not Others?
A: False-PAN-OS supports BGP and segregation.
B: eBGP is for external ASes, not internal segregation; less practical than confederations.
D: Misrepresents BGP capabilities; full mesh isn't required with confederations or route reflectors.
Step 4: Verified References
BGP Confederations: "Divide an AS into sub-ASes for internal segmentation" (docs.paloaltonetworks.com
/pan-os/10-2/pan-os-networking-admin/bgp/bgp-confederations).
PAN-OS BGP: "Supports eBGP, iBGP, and confederations for routing flexibility" (paloaltonetworks.com, PAN-OS Networking Guide).
Use Case: "Confederations suit large internal networks" (knowledgebase.paloaltonetworks.com).
PSE-Strata-Pro-24 Exam Question 4
Which statement applies to the default configuration of a Palo Alto Networks NGFW?
Correct Answer: D
The default configuration of a Palo Alto Networks NGFW includes a set of default security rules that determine how traffic is handled when no explicit rules are defined. Here's the explanation for each option:
* Option A: Security profiles are applied to all policies by default, eliminating implicit trust of any data traversing the firewall
* Security profiles (such as Antivirus, Anti-Spyware, and URL Filtering) are not applied to any policies by default. Administrators must explicitly apply them to security rules.
* This statement is incorrect.
* Option B: The default policy action for intrazone traffic is deny, eliminating implicit trust within a security zone
* By default, traffic within the same zone (intrazone traffic) isallowed. For example, traffic between devices in the "trust" zone is permitted unless explicitly denied by an administrator.
* This statement is incorrect.
* Option C: The default policy action allows all traffic unless explicitly denied
* Palo Alto Networks firewalls do not have an "allow all" default rule. Instead, they include a default "deny all" rule for interzone traffic and an implicit "allow" rule for intrazone traffic.
* This statement is incorrect.
* Option D: The default policy action for interzone traffic is deny, eliminating implicit trust between security zones
* By default, traffic between different zones (interzone traffic) is denied. This aligns with the principle of zero trust, ensuring that no traffic is implicitly allowed between zones.
Administrators must define explicit rules to allow interzone traffic.
* This statement is correct.
References:
* Palo Alto Networks documentation on Security Policy Defaults
* Knowledge Base article on Default Security Rules
* Option A: Security profiles are applied to all policies by default, eliminating implicit trust of any data traversing the firewall
* Security profiles (such as Antivirus, Anti-Spyware, and URL Filtering) are not applied to any policies by default. Administrators must explicitly apply them to security rules.
* This statement is incorrect.
* Option B: The default policy action for intrazone traffic is deny, eliminating implicit trust within a security zone
* By default, traffic within the same zone (intrazone traffic) isallowed. For example, traffic between devices in the "trust" zone is permitted unless explicitly denied by an administrator.
* This statement is incorrect.
* Option C: The default policy action allows all traffic unless explicitly denied
* Palo Alto Networks firewalls do not have an "allow all" default rule. Instead, they include a default "deny all" rule for interzone traffic and an implicit "allow" rule for intrazone traffic.
* This statement is incorrect.
* Option D: The default policy action for interzone traffic is deny, eliminating implicit trust between security zones
* By default, traffic between different zones (interzone traffic) is denied. This aligns with the principle of zero trust, ensuring that no traffic is implicitly allowed between zones.
Administrators must define explicit rules to allow interzone traffic.
* This statement is correct.
References:
* Palo Alto Networks documentation on Security Policy Defaults
* Knowledge Base article on Default Security Rules
PSE-Strata-Pro-24 Exam Question 5
Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)
Correct Answer: B,C
The CN-Series firewalls are Palo Alto Networks' containerized Next-Generation Firewalls (NGFWs) designed to secure Kubernetes clusters. Unlike the Strata Hardware Firewalls (e.g., PA-Series), which are physical appliances, the CN-Series is a software-based solution deployed within containerized environments.
The question focuses on the specific files used to deploy CN-Series firewalls in Kubernetes clusters. Based on Palo Alto Networks' official documentation, the two correct files are PAN-CN-MGMT-CONFIGMAP and PAN-CN-MGMT. Below is a detailed explanation of why these files are essential, with references to CN- Series deployment processes (noting that Strata hardware documentation is not directly applicable here but is contextualized for clarity).
Step 1: Understanding CN-Series Deployment in Kubernetes
The CN-Series firewall consists of two primary components: the CN-MGMT (management plane) and the CN-NGFW (data plane). These components are deployed as containers in a Kubernetes cluster, orchestrated using YAML configuration files. The deployment process involves defining resources such as ConfigMaps, Pods, and Services to instantiate and manage the CN-Series components. The files listed in the question are Kubernetes manifests or configuration files used during this process.
* CN-MGMT Role: The CN-MGMT container handles the management plane, providing configuration, logging, and policy enforcement for the CN-Series firewall. It requires a dedicated YAML file to define its deployment.
* CN-NGFW Role: The CN-NGFW container handles the data plane, inspecting traffic within the Kubernetes cluster. It relies on configurations provided by CN-MGMT and additional networking setup (e.g., via CNI plugins).
* ConfigMaps: Kubernetes ConfigMaps store configuration data separately from container images, making them critical for passing settings to CN-Series components.
Reference:
"CN-Series Deployment Guide" (Palo Alto Networks) outlines the deployment process, stating, "The CN- Series firewall is deployed using Kubernetes YAML files that define the management and data plane components." Step 2: Identifying the Correct Files Option B: PAN-CN-MGMT-CONFIGMAP Explanation:The PAN-CN-MGMT-CONFIGMAP file is a Kubernetes ConfigMap used to store configuration data for the CN-MGMT component. This file includes settings such as Panorama IP addresses, authentication keys, and other parameters needed to initialize the CN-Series management plane. It is applied to the cluster before deploying the CN-MGMT Pod to ensure the management plane has the necessary configuration.
Purpose: Provides the CN-MGMT container with external configuration details, such as connectivity to Panorama for centralized management.
Deployment Step: The ConfigMap is created using a command like kubectl apply -f pan-cn-mgmt- configmap.yaml, as specified in the CN-Series setup process.
Strata Context: While Strata Hardware Firewalls (e.g., PA-400 Series) use Panorama for management too, the CN-Series adapts this concept to Kubernetes with ConfigMaps, a container-native construct.
Reference:
"Deploy the CN-Series Firewall" (Palo Alto Networks) specifies, "Create a ConfigMap using the pan-cn- mgmt-configmap.yaml file to provide configuration data for the CN-MGMT Pod."
"CN-Series Configuration Guide" confirms its role in passing Panorama settings to CN-MGMT.
Why Option B is Correct:PAN-CN-MGMT-CONFIGMAP is a mandatory file for deploying the CN-Series management plane, making it one of the two key files required.
Option C: PAN-CN-MGMT
Explanation:The PAN-CN-MGMT file is the YAML manifest that defines the CN-MGMT Pod deployment in the Kubernetes cluster. This file specifies the container image, resource requirements (e.g., CPU, memory), and references the PAN-CN-MGMT-CONFIGMAP for configuration data. It instantiates the management plane, enabling policy management and integration with Panorama.
Purpose: Deploys the CN-MGMT container as a Pod, which serves as the brain of the CN-Series firewall, managing policies and monitoring the data plane.
Deployment Step: Applied using kubectl apply -f pan-cn-mgmt.yaml, this file brings the management plane online after the ConfigMap is in place.
Strata Context: Unlike Strata hardware, which is pre-installed and configured physically, CN-MGMT uses Kubernetes orchestration, but its management function aligns with the PA-Series' management plane.
Reference:
"CN-Series Deployment Guide" states, "Use the pan-cn-mgmt.yaml file to deploy the CN-MGMT Pod, which manages the CN-Series firewall in the Kubernetes cluster."
"CN-Series Tech Docs" detail the YAML structure for CN-MGMT, including its dependence on the ConfigMap.
Why Option C is Correct:PAN-CN-MGMT is the core deployment file for the CN-Series management plane, making it essential for Kubernetes deployment.
Why Other Options Are Incorrect
Option A: PAN-CN-NGFW-CONFIG
Analysis:There is no file named PAN-CN-NGFW-CONFIG in Palo Alto Networks' CN-Series deployment documentation. The CN-NGFW (data plane) component uses a separate YAML file, typically named pan-cn- ngfw.yaml, to deploy its Pods. However, no "CONFIG" suffix exists, and the data plane deployment relies on CN-MGMT for configuration rather than a standalone ConfigMap with this name.
Reference: "Deploy the CN-Series Firewall" mentions pan-cn-ngfw.yaml for the data plane, not PAN-CN- NGFW-CONFIG.
Option D: PAN-CNI-MULTUS
Analysis:The PAN-CNI-MULTUS file relates to the Container Network Interface (CNI) plugin used for advanced networking in CN-Series deployments, such as Multus for multiple network interfaces. While it is part of the networking setup (e.g., to enable traffic redirection to CN-NGFW), it is not one of the primary files for deploying the CN-Series firewall itself. The question asks for files directly tied to firewall deployment, not optional networking enhancements.
Reference: "CN-Series Networking Guide" mentions Multus CNI as an optional configuration, applied separately via pan-cni-multus.yaml, not a core deployment file.
Conclusion
The CN-Series firewall deployment in Kubernetes clusters relies on PAN-CN-MGMT-CONFIGMAP (B) to provide configuration data and PAN-CN-MGMT (C) to deploy the management plane Pod. These two files are explicitly required per Palo Alto Networks' CN-Series documentation, ensuring the firewall's management component is operational. While Strata Hardware Firewalls like the PA-Series operate in physical environments, the CN-Series adapts similar NGFW capabilities to containers, with these files serving as the Kubernetes equivalent of hardware setup and configuration.
The question focuses on the specific files used to deploy CN-Series firewalls in Kubernetes clusters. Based on Palo Alto Networks' official documentation, the two correct files are PAN-CN-MGMT-CONFIGMAP and PAN-CN-MGMT. Below is a detailed explanation of why these files are essential, with references to CN- Series deployment processes (noting that Strata hardware documentation is not directly applicable here but is contextualized for clarity).
Step 1: Understanding CN-Series Deployment in Kubernetes
The CN-Series firewall consists of two primary components: the CN-MGMT (management plane) and the CN-NGFW (data plane). These components are deployed as containers in a Kubernetes cluster, orchestrated using YAML configuration files. The deployment process involves defining resources such as ConfigMaps, Pods, and Services to instantiate and manage the CN-Series components. The files listed in the question are Kubernetes manifests or configuration files used during this process.
* CN-MGMT Role: The CN-MGMT container handles the management plane, providing configuration, logging, and policy enforcement for the CN-Series firewall. It requires a dedicated YAML file to define its deployment.
* CN-NGFW Role: The CN-NGFW container handles the data plane, inspecting traffic within the Kubernetes cluster. It relies on configurations provided by CN-MGMT and additional networking setup (e.g., via CNI plugins).
* ConfigMaps: Kubernetes ConfigMaps store configuration data separately from container images, making them critical for passing settings to CN-Series components.
Reference:
"CN-Series Deployment Guide" (Palo Alto Networks) outlines the deployment process, stating, "The CN- Series firewall is deployed using Kubernetes YAML files that define the management and data plane components." Step 2: Identifying the Correct Files Option B: PAN-CN-MGMT-CONFIGMAP Explanation:The PAN-CN-MGMT-CONFIGMAP file is a Kubernetes ConfigMap used to store configuration data for the CN-MGMT component. This file includes settings such as Panorama IP addresses, authentication keys, and other parameters needed to initialize the CN-Series management plane. It is applied to the cluster before deploying the CN-MGMT Pod to ensure the management plane has the necessary configuration.
Purpose: Provides the CN-MGMT container with external configuration details, such as connectivity to Panorama for centralized management.
Deployment Step: The ConfigMap is created using a command like kubectl apply -f pan-cn-mgmt- configmap.yaml, as specified in the CN-Series setup process.
Strata Context: While Strata Hardware Firewalls (e.g., PA-400 Series) use Panorama for management too, the CN-Series adapts this concept to Kubernetes with ConfigMaps, a container-native construct.
Reference:
"Deploy the CN-Series Firewall" (Palo Alto Networks) specifies, "Create a ConfigMap using the pan-cn- mgmt-configmap.yaml file to provide configuration data for the CN-MGMT Pod."
"CN-Series Configuration Guide" confirms its role in passing Panorama settings to CN-MGMT.
Why Option B is Correct:PAN-CN-MGMT-CONFIGMAP is a mandatory file for deploying the CN-Series management plane, making it one of the two key files required.
Option C: PAN-CN-MGMT
Explanation:The PAN-CN-MGMT file is the YAML manifest that defines the CN-MGMT Pod deployment in the Kubernetes cluster. This file specifies the container image, resource requirements (e.g., CPU, memory), and references the PAN-CN-MGMT-CONFIGMAP for configuration data. It instantiates the management plane, enabling policy management and integration with Panorama.
Purpose: Deploys the CN-MGMT container as a Pod, which serves as the brain of the CN-Series firewall, managing policies and monitoring the data plane.
Deployment Step: Applied using kubectl apply -f pan-cn-mgmt.yaml, this file brings the management plane online after the ConfigMap is in place.
Strata Context: Unlike Strata hardware, which is pre-installed and configured physically, CN-MGMT uses Kubernetes orchestration, but its management function aligns with the PA-Series' management plane.
Reference:
"CN-Series Deployment Guide" states, "Use the pan-cn-mgmt.yaml file to deploy the CN-MGMT Pod, which manages the CN-Series firewall in the Kubernetes cluster."
"CN-Series Tech Docs" detail the YAML structure for CN-MGMT, including its dependence on the ConfigMap.
Why Option C is Correct:PAN-CN-MGMT is the core deployment file for the CN-Series management plane, making it essential for Kubernetes deployment.
Why Other Options Are Incorrect
Option A: PAN-CN-NGFW-CONFIG
Analysis:There is no file named PAN-CN-NGFW-CONFIG in Palo Alto Networks' CN-Series deployment documentation. The CN-NGFW (data plane) component uses a separate YAML file, typically named pan-cn- ngfw.yaml, to deploy its Pods. However, no "CONFIG" suffix exists, and the data plane deployment relies on CN-MGMT for configuration rather than a standalone ConfigMap with this name.
Reference: "Deploy the CN-Series Firewall" mentions pan-cn-ngfw.yaml for the data plane, not PAN-CN- NGFW-CONFIG.
Option D: PAN-CNI-MULTUS
Analysis:The PAN-CNI-MULTUS file relates to the Container Network Interface (CNI) plugin used for advanced networking in CN-Series deployments, such as Multus for multiple network interfaces. While it is part of the networking setup (e.g., to enable traffic redirection to CN-NGFW), it is not one of the primary files for deploying the CN-Series firewall itself. The question asks for files directly tied to firewall deployment, not optional networking enhancements.
Reference: "CN-Series Networking Guide" mentions Multus CNI as an optional configuration, applied separately via pan-cni-multus.yaml, not a core deployment file.
Conclusion
The CN-Series firewall deployment in Kubernetes clusters relies on PAN-CN-MGMT-CONFIGMAP (B) to provide configuration data and PAN-CN-MGMT (C) to deploy the management plane Pod. These two files are explicitly required per Palo Alto Networks' CN-Series documentation, ensuring the firewall's management component is operational. While Strata Hardware Firewalls like the PA-Series operate in physical environments, the CN-Series adapts similar NGFW capabilities to containers, with these files serving as the Kubernetes equivalent of hardware setup and configuration.
- Latest Upload
- 108ServiceNow.CAD.v2026-01-08.q124
- 110Salesforce.Analytics-DA-201.v2026-01-08.q73
- 121Snowflake.DAA-C01.v2026-01-08.q80
- 104Salesforce.Revenue-Cloud-Consultant-Accredited-Professional.v2026-01-08.q37
- 108Microsoft.SC-401.v2026-01-07.q60
- 110Nokia.4A0-D01.v2026-01-07.q15
- 111Splunk.SPLK-5001.v2026-01-07.q50
- 107Huawei.H12-411_V2.0.v2026-01-07.q269
- 114HP.HPE7-A06.v2026-01-06.q32
- 122Splunk.SPLK-1003.v2026-01-06.q93
[×]
Download PDF File
Enter your email address to download PaloAltoNetworks.PSE-Strata-Pro-24.v2025-11-22.q24 Practice Test
