Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks SSE-Engineer Palo Alto Networks Security Service Edge Engineer Exam Practice Test

Demo: 15 questions
Total 50 questions

Palo Alto Networks Security Service Edge Engineer Questions and Answers

Question 1

In an Explicit Proxy deployment where no agent can be used on the endpoint, which authentication method is supported with mobile users?

Options:

A.

LDAP

B.

Kerberos

C.

SAML

D.

SSO

Question 2

When a review of devices discovered by IoT Security reveals network routers appearing multiple times with different IP addresses, which configuration will address the issue by showing only unique devices?

Options:

A.

Add the duplicate entries to the ignore list in IoT Security.

B.

Merge individual devices into a single device with multiple interfaces.

C.

Create a custom role to merge devices with the same hostname and operating system.

D.

Delete all duplicate devices, keeping only those discovered using their management IP addresses.

Question 3

A company has a Prisma Access deployment for mobile users in North America and Europe. Service connections are deployed to the data centers on these continents, and the data centers are connected by private links.

With default routing mode, which action will verify that traffic being delivered to mobile users traverses the service connection in the appropriate regions?

Options:

A.

Configure BGP on the customer premises equipment (CPE) to prefer the assigned community string attribute on the mobile user prefixes in its respective Prisma Access region.

B.

Configure each service connection to filter out the mobile user pool prefixes from the other region in the advertisements to the data center.

C.

Configure BGP on the customer premises equipment (CPE) to prefer the MED attribute on the mobile user prefixes in its respective Prisma Access region.

D.

Configure each service connection to prepend the BGP ASN five times for mobile user pool prefixes originating from the other region.

Question 4

An engineer has configured a Web Security rule that restricts access to certain web applications for a specific user group. During testing, the rule does not take effect as expected, and the users can still access blocked web applications.

What is a reason for this issue?

Options:

A.

The rule was created with improper threat management settings.

B.

The rule was created in the wrong scope, affecting only GlobalProtect users instead of all users.

C.

The rule was created at a higher level in the rule hierarchy, giving priority to a lower-level rule.

D.

The rule was created at a lower level in the rule hierarchy, giving priority to a higher-level rule.

Question 5

Based on the image below, which two statements describe the reason and action required to resolve the errors? (Choose two.)

Options:

A.

The client is misconfigured.

B.

Create a do not decrypt rule for the hostname “google.com.”

C.

The server has pinned certificates.

D.

Create a do not decrypt rule for the hostname “certificates.godaddy.com.”

Question 6

When configuring Remote Browser Isolation (RBI) with Prisma Access (Managed by Strata Cloud Manager), which element is required to define the protected URLs for mobile users?

Options:

A.

A URL access management profile with site access set to “Isolate” applied to a Security policy

B.

A DNS Security profile applied to a Security policy with the action of “Isolate” for the target remote browser DNS categories

C.

An RBI profile applied to the URL access management profile

D.

A Security policy with the target URL categories and set the action to “Isolate”

Question 7

An engineer has configured IPSec tunnels for two remote network locations; however, users are experiencing intermittent connectivity issues across the tunnels.

What action will allow the engineer to receive notifications when the IPSec tunnels are down or experiencing instability?

Options:

A.

Create a new notification profile specifying conditions for remote network IPSec tunnels.

B.

Create a tunnel log notification rule to alert on specified remote network IPSec tunnel conditions.

C.

Set up the operational health dashboard to email alerts for remote Network IPSec tunnel issues.

D.

Select the IPSec tunnel monitoring and notifications checkbox when configuring the remote network IPSec tunnels.

Question 8

Which two actions can a company with Prisma Access deployed take to use the Egress IP API to automate policy rule updates when the IP addresses used by Prisma Access change? (Choose two.)

Options:

A.

Configure a webhook to receive notifications of IP address changes.

B.

Copy the Egress IP API Key in the service infrastructure settings.

C.

Enable the Egress IP API endpoint in Prisma Access.

D.

Download a client certificate to authenticate to the Egress IP API.

Question 9

Which Cloud Identity Engine capability will create a Security policy that uses Entra ID attributes as the source identification?

Options:

A.

Entra ID Group Attribute

B.

Attribute Group Mapping

C.

Entra ID Cloud Group

D.

Cloud Dynamic User Group

Question 10

An engineer configures User-ID redistribution from an on-premises firewall connected to Prisma Access (Managed by Panorama) using a service connection. After committing the configuration, traffic from remote network connections is still not matching the correct user-based policies.

Which two configurations need to be validated? (Choose two.)

Options:

A.

Ensure the Remote_Network_Template is selected when adding the User-ID Agent in Panorama.

B.

Confirm there is a Security policy configured in Prisma Access to allow the communication on port 5007.

C.

Confirm the Collector Pre-Shared Keys match between Prisma Access and the on-premises firewall.

D.

Ensure the Service_Conn_Template is selected when adding the User-ID Agent in Panorama.

Question 11

Which statement applies when enabling multitenancy in Prisma Access (Managed by Panorama)?

Options:

A.

Service connection licenses will be assigned only to the first tenant, and these service connections can be shared with the other tenants.

B.

A single tenant cannot consist solely of mobile users or solely of remote networks.

C.

Each tenant is allocated its own dedicated Prisma Access instances, with compute resources that are not shared across tenants.

D.

There is flexibility to manage different tenants using separate Panoramas, which allows for better organization and management of the multiple tenants.

Question 12

An engineer configures a Security policy for traffic originating at branch locations in the Remote Networks configuration scope. After committing the configuration and reviewing the logs, the branch traffic is not matching the Security policy.

Which statement explains the branch traffic behavior?

Options:

A.

The source address was configured with an address object including the branch location prefixes.

B.

The source zone was configured as “Trust.”

C.

The Security policy did not meet best practice standards and was automatically removed.

D.

The traffic is matching a Security policy in the Prisma Access configuration scope.

Question 13

A customer is implementing Prisma Access (Managed by Strata Cloud Manager) to connect mobile users, branch locations, and business-to- business (B2B) partners to their data centers.

The solution must meet these requirements:

The mobile users must have internet filtering, data center connectivity, and remote site connectivity to the branch locations.

The branch locations must have internet filtering and data center connectivity.

The B2B partner connections must only have access to specific data center internally developed applications running on non-standard ports.

The security team must have access to manage the mobile user and access to branch locations.

The network team must have access to manage only the partner access.

How can the engineer configure mobile users and branch locations to meet the requirements?

Options:

A.

Use GlobalProtect and Remote Networks to filter internet traffic and provide access to data center resources using service connections.

B.

Use Explicit Proxy to filter internet traffic and provide access to data center resources using service connections.

C.

Use GlobalProtect to filter internet traffic and provide access to data center resources using service connections.

D.

Use Explicit Proxy and Remote Networks to filter internet traffic and provide access to data center resources using service connections.

Question 14

During a deployment of Prisma Access (Managed by Strata Cloud Manager) for mobile users, a SAML authentication type and authentication profile in the Cloud Identity Engine application is successfully created.

Using this SAML authentication, what is a valid next step to configure authentication for mobile users?

Options:

A.

Perform a full commit to Strata Cloud Manager so the Cloud Identity Engine profiles get synchronized from the application.

B.

Permit the Cloud Identity Engine service account RBAC access to the mobile user folder in Strata Cloud Manager.

C.

In Strata Cloud Manager, create a new authentication type of “Cloud Identity Engine.”

D.

Create a SAML authentication profile in Strata Cloud Manager and link it to the Cloud Identity Engine profile.

Question 15

All mobile users are unable to authenticate to Prisma Access (Managed by Strata Cloud Manager) using SAML authentication through the Cloud Identity Engine. Users report that after entering their credentials on the Identity Provider (IdP) login page, they are redirected to the Prisma Access portal without successful authentication, and they receive this error message:

Error: Prisma Access Portal Authentication Failed using CIE-SAML with message “400 Bad Request”

Which action will identify the root cause of this error?

Options:

A.

Verify the SAML metadata configuration in both Strata Cloud Manager and the IdP portal to confirm that the endpoint URLs and certificates are correctly configured.

B.

Examine the Security policy rules in Prisma Access to ensure that traffic from the IdP is allowed and not blocked.

C.

Verify the SAML metadata configuration in both the Cloud Identity Engine and the IdP portal to confirm that the endpoint URLs and certificates are correctly configured.

D.

Review the Authentication logs in Strata Cloud Manager to check for any SAML error messages or authentication failures.

Demo: 15 questions
Total 50 questions