Pass the Paloalto Networks SASE Professional PSE-SASE Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?

Options:

A.

Step 4: Create the Zero Trust Policy


B.

Step 3: Architect a Zero Trust Network


C.

Step 1: Define the Protect Surface


D.

Step 5: Monitor and Maintain the Network


Expert Solution
Questions # 12:

Users connect to a server in the data center for file sharing. The organization wants to decrypt the traffic to this server in order to scan the files being uploaded and downloaded to determine if malware or sensitive data is being moved by users.

Which proxy should be used to decrypt this traffic?

Options:

A.

SCP Proxy


B.

SSL Inbound Proxy


C.

SSH Forward Proxy


D.

SSL Forward Proxy


Expert Solution
Questions # 13:

Which two point products are consolidated into the Prisma secure access service edge (SASE) platform? (Choose two.)

Options:

A.

Autonomous Digital Experience Management (ADEM)


B.

firewall as a service (FWaaS)


C.

Threat Intelligence Platform (TIP)


D.

security information and event management (SIEM)


Expert Solution
Questions # 14:

Which element of a secure access service edge (SASE)-enabled network provides true integration of services, not service chains, with combined services and visibility for all locations, mobile users, and the cloud?

Options:

A.

identity and network location


B.

broad network-edge support


C.

converged WAN edge and network security


D.

cloud-native, cloud-based delivery


Expert Solution
Questions # 15:

Which App Response Time metric measures the amount of time it takes to transfer incoming data from an external server to a local client?

Options:

A.

UDP Response Time (UDP-TRT)


B.

Server Response Time (SRT)


C.

Network Transfer Time (NTTn)


D.

Round Trip Time (RTT)


Expert Solution
Questions # 16:

What allows enforcement of policies based on business intent, enables dynamic path selection, and provides visibility into performance and availability for applications and networks?

Options:

A.

Identity Access Management (IAM) methods


B.

Firewall as a Service (FWaaS)


C.

Instant-On Network (ION) devices


D.

Cloud Access Security Broker (CASB)


Expert Solution
Questions # 17:

In the aggregate model, how are bandwidth allocations and interface tags applied beginning in Prisma Access 1.8?

Options:

A.

License bandwidth is allocated to a CloudGenix controller; interface tags are set with a compute region.


B.

License bandwidth is allocated to a compute region; interface tags are set with a CloudGenix controller.


C.

License bandwidth is allocated to a compute region; interface tags are set with a Prisma Access location.


D.

License bandwidth is allocated to a Prisma Access location; interface tags are set with a compute region.


Expert Solution
Questions # 18:

What are three ways the secure access service edge (SASE) model can help an organization? (Choose three.)

Options:

A.

cost savings


B.

data protection


C.

increased licensing requirements


D.

increased performance


E.

decreased reliance on best practices


Expert Solution
Questions # 19:

Which CLI command allows visibility into SD-WAN events such as path selection and path quality measurements?

Options:

A.

>show sdwan connection all |


B.

>show sdwan session distribution policy-name


C.

>show sdwan path-monitor stats vif


D.

>show sdwan event


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions