Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks SSE-Engineer Palo Alto Networks Security Service Edge Engineer Exam Practice Test

Palo Alto Networks Security Service Edge Engineer Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

An engineer has configured a Web Security rule that restricts access to certain web applications for a specific user group. During testing, the rule does not take effect as expected, and the users can still access blocked web applications.

What is a reason for this issue?

Options:

A.

The rule was created with improper threat management settings.

B.

The rule was created in the wrong scope, affecting only GlobalProtect users instead of all users.

C.

The rule was created at a higher level in the rule hierarchy, giving priority to a lower-level rule.

D.

The rule was created at a lower level in the rule hierarchy, giving priority to a higher-level rule.

Question 2

What must be configured to accurately report an application's availability when onboarding a discovered application for ZTNA Connector?

Options:

A.

icmp ping

B.

https ping

C.

tcp ping

D.

udp ping

Question 3

When a review of devices discovered by IoT Security reveals network routers appearing multiple times with different IP addresses, which configuration will address the issue by showing only unique devices?

Options:

A.

Add the duplicate entries to the ignore list in IoT Security.

B.

Merge individual devices into a single device with multiple interfaces.

C.

Create a custom role to merge devices with the same hostname and operating system.

D.

Delete all duplicate devices, keeping only those discovered using their management IP addresses.

Question 4

What is the impact of selecting the “Disable Server Response Inspection” checkbox after confirming that a Security policy rule has a threat protection profile configured?

Options:

A.

Only HTTP traffic from the server to the client will bypass threat inspection.

B.

The threat protection profile will override the 'Disable Server Response Inspection1 only for HTTP traffic from the server to the client.

C.

All traffic from the server to the client will bypass threat inspection.

D.

The threat protection profile will override the 'Disable Server Response Inspection1 for all traffic from the server to the client.

Question 5

Which feature within Strata Cloud Manager (SCM) allows an operations team to view applications, threats, and user insights for branch locations for both NGFW and Prisma Access simultaneously?

Options:

A.

Command Center

B.

Log Viewer

C.

Branch Site Monitor

D.

SASE Health Dashboard

Question 6

Strata Logging Service is configured to forward logs to an external syslog server; however, a month later, there is a disruption on the syslog server.

Which action will send the missing logs to the external syslog server?

Options:

A.

Configure a replay profile with the affected time range and associate it with the affected syslog server profile.

B.

Delete the affected syslog server profile and create a new one.

C.

Export the logs from Strata Logging Service, and then manually import them to the syslog server.

D.

Configure a log filter under the syslog server profile with the affected time range.

Question 7

A malicious user is attempting to connect to a blocked website by crafting a packet using a fake SNI and the correct website in the HTTP host header.

Which option will prevent this form of attack?

Options:

A.

Advanced Threat Prevention option to block “Domain Fronting”

B.

Advanced URL Filtering and block the “Malicious Behavior” category

C.

Advanced URL Filtering and block “SNI mismatch with Server Certificate (SAN/CN)”

D.

SSL Decryption to “Block sessions on SNI mismatch with Server Certificate (SAN/CN)”

Question 8

A company has four branch offices between Canada Central and Canada East which use the same IPSec termination node and have QoS configured with customized bandwidth per site. An engineer wants to onboard a new branch office on the same IPSec termination node.

What is the QoS behavior for the new branch office?

Options:

A.

Automatically distributed to 25% for each site

B.

Unallocated until manually assigned

C.

Automatically distributed to 20% for each site

D.

Cannot be added to existing QoS configuration

Question 9

Which two statements apply when a customer has a large branch office with employees who all arrive and log in within a five-minute time period? (Choose two.)

Options:

A.

DNS results are only cached for frequently used hostnames.

B.

Maximum pending TCP DNS requests is 64.

C.

Maximum number of TCP DNS retries is 3.

D.

DNS results are cached for 300 seconds.

Question 10

How can an engineer use risk score customization in SaaS Security Inline to limit the use of unsanctioned SaaS applications by employees within a Security policy?

Options:

A.

Lower the risk score of sanctioned applications and increase the risk score for unsanctioned applications.

B.

Increase the risk score for all SaaS applications to automatically block unwanted applications.

C.

Build an application filter using unsanctioned SaaS as the category.

D.

Build an application filter using unsanctioned SaaS as the characteristic.

Question 11

Based on the image below, which two statements describe the reason and action required to resolve the errors? (Choose two.)

Options:

A.

The client is misconfigured.

B.

Create a do not decrypt rule for the hostname “google.com.”

C.

The server has pinned certificates.

D.

Create a do not decrypt rule for the hostname “certificates.godaddy.com.”

Question 12

An intern is tasked with changing the Anti-Spyware Profile used for security rules defined in the GlobalProtect folder. All security rules are using the Default Prisma Profile. The intern reports that the options are greyed out and cannot be modified when selecting the Default Prisma Profile.

Based on the image below, which action will allow the intern to make the required modifications?

Options:

A.

Request edit access for the GlobalProtect scope.

B.

Change the configuration scope to Prisma Access and modify the profile group.

C.

Create a new profile, because default profile groups cannot be modified.

D.

Modify the existing anti-spyware profile, because best-practice profiles cannot be removed from a group.

Question 13

All mobile users are unable to authenticate to Prisma Access (Managed by Strata Cloud Manager) using SAML authentication through the Cloud Identity Engine. Users report that after entering their credentials on the Identity Provider (IdP) login page, they are redirected to the Prisma Access portal without successful authentication, and they receive this error message:

Error: Prisma Access Portal Authentication Failed using CIE-SAML with message “400 Bad Request”

Which action will identify the root cause of this error?

Options:

A.

Verify the SAML metadata configuration in both Strata Cloud Manager and the IdP portal to confirm that the endpoint URLs and certificates are correctly configured.

B.

Examine the Security policy rules in Prisma Access to ensure that traffic from the IdP is allowed and not blocked.

C.

Verify the SAML metadata configuration in both the Cloud Identity Engine and the IdP portal to confirm that the endpoint URLs and certificates are correctly configured.

D.

Review the Authentication logs in Strata Cloud Manager to check for any SAML error messages or authentication failures.

Question 14

When configuring Remote Browser Isolation (RBI) with Prisma Access (Managed by Strata Cloud Manager), which element is required to define the protected URLs for mobile users?

Options:

A.

A URL access management profile with site access set to “Isolate” applied to a Security policy

B.

A DNS Security profile applied to a Security policy with the action of “Isolate” for the target remote browser DNS categories

C.

An RBI profile applied to the URL access management profile

D.

A Security policy with the target URL categories and set the action to “Isolate”

Question 15

Which two configurations must be enabled to allow App Acceleration for SaaS applications? (Choose two.)

Options:

A.

Acceleration agent for the client machines

B.

QoS for user traffic

C.

Trusted Root CA for the CA certificate

D.

Forward Trust Certificate for the CA certificate