Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks SSE-Engineer Palo Alto Networks Security Service Edge Engineer Exam Practice Test

Page: 1 / 5
Total 50 questions

Palo Alto Networks Security Service Edge Engineer Questions and Answers

Question 1

Which two statements apply when a customer has a large branch office with employees who all arrive and log in within a five-minute time period? (Choose two.)

Options:

A.

DNS results are only cached for frequently used hostnames.

B.

Maximum pending TCP DNS requests is 64.

C.

Maximum number of TCP DNS retries is 3.

D.

DNS results are cached for 300 seconds.

Question 2

Which two configurations must be enabled to allow App Acceleration for SaaS applications? (Choose two.)

Options:

A.

Acceleration agent for the client machines

B.

QoS for user traffic

C.

Trusted Root CA for the CA certificate

D.

Forward Trust Certificate for the CA certificate

Question 3

A customer is implementing Prisma Access (Managed by Strata Cloud Manager) to connect mobile users, branch locations, and business-to- business (B2B) partners to their data centers.

The solution must meet these requirements:

The mobile users must have internet filtering, data center connectivity, and remote site connectivity to the branch locations.

The branch locations must have internet filtering and data center connectivity.

The B2B partner connections must only have access to specific data center internally developed applications running on non-standard ports.

The security team must have access to manage the mobile user and access to branch locations.

The network team must have access to manage only the partner access.

How should Prisma Access be implemented to meet the customer requirements?

Options:

A.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the Strata Multitenant Cloud Manager Prisma Access configuration scope to manage access.

B.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the Prisma Access Configuration scope to manage all access.

C.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the specific configuration scope for the connection type to manage access.

D.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the specific configuration scope for the connection type to manage access.

Question 4

After configuring domain-based split tunnel for zoom.us, how is expected behavior on the client machine confirmed?

Options:

A.

Verify from the routing table.

B.

Enable dump level logs on GlobalProtect Application.

C.

Verify zoom.us is resolved by the tunnel assigned DNS server.

D.

Ping zoom.us from the CLI.

Question 5

Where are tags applied to control access to Generative AI when implementing AI Access Security?

Options:

A.

To Generative AI applications for identifying sanctioned, tolerated, or unsanctioned applications

B.

To security rules for defining which types of Generative AI applications are allowed or blocked

C.

To user devices for identifying and controlling which Generative AI applications they can access

D.

To Generative AI URL categories for classifying trusted and untrusted Generative AI websites

Question 6

An engineer deploys a new branch connected to Prisma Access. From the customer premises equipment (CPE) device at the branch, Phase 1 on the tunnel is established, but Phase 2-encrypted packets are not coming back from Prisma Access.

Which Strata Logging Service log facility should the engineer review to determine why Phase 2-encrypted traffic is not being received?

Options:

A.

Decrypt logs

B.

System logs

C.

Traffic logs

D.

Tunnel logs

Question 7

An engineer configures User-ID redistribution from an on-premises firewall connected to Prisma Access (Managed by Panorama) using a service connection. After committing the configuration, traffic from remote network connections is still not matching the correct user-based policies.

Which two configurations need to be validated? (Choose two.)

Options:

A.

Ensure the Remote_Network_Template is selected when adding the User-ID Agent in Panorama.

B.

Confirm there is a Security policy configured in Prisma Access to allow the communication on port 5007.

C.

Confirm the Collector Pre-Shared Keys match between Prisma Access and the on-premises firewall.

D.

Ensure the Service_Conn_Template is selected when adding the User-ID Agent in Panorama.

Question 8

How can a senior engineer use Strata Cloud Manager (SCM) to ensure that junior engineers are able to create compliant policies while preventing the creation of policies that may result in security gaps?

Options:

A.

Use security checks under posture settings and set the action to “deny” for all checks that do not meet the compliance standards.

B.

Configure role-based access controls (RBACs) for all junior engineers to limit them to creating policies in a disabled state, manually review the policies, and enable them using a senior engineer role.

C.

Configure an auto tagging rule in SCM to trigger a Security policy review workflow based on a security rule tag, then instruct junior engineers to use this tag for all new Security policies.

D.

Run a Best Practice Assessment (BPA) at regular intervals and manually revert any policies not meeting company compliance standards.

Question 9

What is the purpose of embargo rules in Prisma Access?

Options:

A.

Rate-limiting connections originating from specific countries

B.

Allowing traffic only from specific countries

C.

Blocking connections from specific countries

D.

Blocking traffic from Russia. China, and North Korea only

Question 10

During a deployment of Prisma Access (Managed by Strata Cloud Manager) for mobile users, a SAML authentication type and authentication profile in the Cloud Identity Engine application is successfully created.

Using this SAML authentication, what is a valid next step to configure authentication for mobile users?

Options:

A.

Perform a full commit to Strata Cloud Manager so the Cloud Identity Engine profiles get synchronized from the application.

B.

Permit the Cloud Identity Engine service account RBAC access to the mobile user folder in Strata Cloud Manager.

C.

In Strata Cloud Manager, create a new authentication type of “Cloud Identity Engine.”

D.

Create a SAML authentication profile in Strata Cloud Manager and link it to the Cloud Identity Engine profile.

Question 11

Which policy configuration in Prisma Access Browser (PAB) will protect an organization from malicious BYOD and minimize the impact on the user experience?

Options:

A.

One that blocks file exchange

B.

One for session recording

C.

One that blocks elements such as screen scrapers

D.

One that allows access to applications with data masking or watermarking

Question 12

An engineer configures a Security policy for traffic originating at branch locations in the Remote Networks configuration scope. After committing the configuration and reviewing the logs, the branch traffic is not matching the Security policy.

Which statement explains the branch traffic behavior?

Options:

A.

The source address was configured with an address object including the branch location prefixes.

B.

The source zone was configured as “Trust.”

C.

The Security policy did not meet best practice standards and was automatically removed.

D.

The traffic is matching a Security policy in the Prisma Access configuration scope.

Question 13

How can a network security team be granted full administrative access to a tenant's configuration while restricting access to other tenants by using role-based access control (RBAC) for Panorama Managed Prisma Access in a multitenant environment?

Options:

A.

Create an Access Domain and restrict access to only the Device Groups and Templates for the Target Tenant.

B.

Create a custom role enabling all privileges within the specific tenant's scope and assign it to the security team's user accounts.

C.

Create a custom role with Device Group and Template privileges and assign it to the security team's user accounts.

D.

Set the administrative accounts for the security team to the "Superuser" role.

Question 14

When configuring Remote Browser Isolation (RBI) with Prisma Access (Managed by Strata Cloud Manager), which element is required to define the protected URLs for mobile users?

Options:

A.

A URL access management profile with site access set to “Isolate” applied to a Security policy

B.

A DNS Security profile applied to a Security policy with the action of “Isolate” for the target remote browser DNS categories

C.

An RBI profile applied to the URL access management profile

D.

A Security policy with the target URL categories and set the action to “Isolate”

Question 15

How can an engineer use risk score customization in SaaS Security Inline to limit the use of unsanctioned SaaS applications by employees within a Security policy?

Options:

A.

Lower the risk score of sanctioned applications and increase the risk score for unsanctioned applications.

B.

Increase the risk score for all SaaS applications to automatically block unwanted applications.

C.

Build an application filter using unsanctioned SaaS as the category.

D.

Build an application filter using unsanctioned SaaS as the characteristic.

Page: 1 / 5
Total 50 questions