Pass the Paloalto Networks Network Security Administrator SSE-Engineer Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Where are tags applied to control access to Generative AI when implementing AI Access Security?

Options:

A.

To Generative AI applications for identifying sanctioned, tolerated, or unsanctioned applications


B.

To security rules for defining which types of Generative AI applications are allowed or blocked


C.

To user devices for identifying and controlling which Generative AI applications they can access


D.

To Generative AI URL categories for classifying trusted and untrusted Generative AI websites


Questions # 2:

A company has a Prisma Access deployment for mobile users in North America and Europe. Service connections are deployed to the data centers on these continents, and the data centers are connected by private links.

With default routing mode, which action will verify that traffic being delivered to mobile users traverses the service connection in the appropriate regions?

Options:

A.

Configure BGP on the customer premises equipment (CPE) to prefer the assigned community string attribute on the mobile user prefixes in its respective Prisma Access region.


B.

Configure each service connection to filter out the mobile user pool prefixes from the other region in the advertisements to the data center.


C.

Configure BGP on the customer premises equipment (CPE) to prefer the MED attribute on the mobile user prefixes in its respective Prisma Access region.


D.

Configure each service connection to prepend the BGP ASN five times for mobile user pool prefixes originating from the other region.


Questions # 3:

An engineer configures a Security policy for traffic originating at branch locations in the Remote Networks configuration scope. After committing the configuration and reviewing the logs, the branch traffic is not matching the Security policy.

Which statement explains the branch traffic behavior?

Options:

A.

The source address was configured with an address object including the branch location prefixes.


B.

The source zone was configured as “Trust.”


C.

The Security policy did not meet best practice standards and was automatically removed.


D.

The traffic is matching a Security policy in the Prisma Access configuration scope.


Questions # 4:

An engineer deploys a new branch connected to Prisma Access. From the customer premises equipment (CPE) device at the branch, Phase 1 on the tunnel is established, but Phase 2-encrypted packets are not coming back from Prisma Access.

Which Strata Logging Service log facility should the engineer review to determine why Phase 2-encrypted traffic is not being received?

Options:

A.

Decrypt logs


B.

System logs


C.

Traffic logs


D.

Tunnel logs


Questions # 5:

How can an engineer verify that only the intended changes will be applied when modifying Prisma Access policy configuration in Strata Cloud Manager (SCM)?

Options:

A.

Review the SCM portal for blue circular indicators next to each configuration menu item and ensure only the intended areas of configuration have this indicator.


B.

Compare the candidate configuration and the most recent version under "Config Version Snapshots/


C.

Select the most recent job under Operations > Push Status to view the pending changes that would apply to Prisma Access.


D.

Open the push dialogue in SCM to preview all changes which would be pushed to Prisma Access.


Questions # 6:

A customer is implementing Prisma Access (Managed by Strata Cloud Manager) to connect mobile users, branch locations, and business-to- business (B2B) partners to their data centers.

The solution must meet these requirements:

The mobile users must have internet filtering, data center connectivity, and remote site connectivity to the branch locations.

The branch locations must have internet filtering and data center connectivity.

The B2B partner connections must only have access to specific data center internally developed applications running on non-standard ports.

The security team must have access to manage the mobile user and access to branch locations.

The network team must have access to manage only the partner access.

How should Prisma Access be implemented to meet the customer requirements?

Options:

A.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the Strata Multitenant Cloud Manager Prisma Access configuration scope to manage access.


B.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the Prisma Access Configuration scope to manage all access.


C.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the specific configuration scope for the connection type to manage access.


D.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the specific configuration scope for the connection type to manage access.


Questions # 7:

Based on the image below, which two statements describe the reason and action required to resolve the errors? (Choose two.)

Question # 7

Options:

A.

The client is misconfigured.


B.

Create a do not decrypt rule for the hostname “google.com.”


C.

The server has pinned certificates.


D.

Create a do not decrypt rule for the hostname “certificates.godaddy.com.”


Questions # 8:

An engineer has configured a Web Security rule that restricts access to certain web applications for a specific user group. During testing, the rule does not take effect as expected, and the users can still access blocked web applications.

What is a reason for this issue?

Options:

A.

The rule was created with improper threat management settings.


B.

The rule was created in the wrong scope, affecting only GlobalProtect users instead of all users.


C.

The rule was created at a higher level in the rule hierarchy, giving priority to a lower-level rule.


D.

The rule was created at a lower level in the rule hierarchy, giving priority to a higher-level rule.


Questions # 9:

Which two statements apply when a customer has a large branch office with employees who all arrive and log in within a five-minute time period? (Choose two.)

Options:

A.

DNS results are only cached for frequently used hostnames.


B.

Maximum pending TCP DNS requests is 64.


C.

Maximum number of TCP DNS retries is 3.


D.

DNS results are cached for 300 seconds.


Questions # 10:

How can a senior engineer use Strata Cloud Manager (SCM) to ensure that junior engineers are able to create compliant policies while preventing the creation of policies that may result in security gaps?

Options:

A.

Use security checks under posture settings and set the action to “deny” for all checks that do not meet the compliance standards.


B.

Configure role-based access controls (RBACs) for all junior engineers to limit them to creating policies in a disabled state, manually review the policies, and enable them using a senior engineer role.


C.

Configure an auto tagging rule in SCM to trigger a Security policy review workflow based on a security rule tag, then instruct junior engineers to use this tag for all new Security policies.


D.

Run a Best Practice Assessment (BPA) at regular intervals and manually revert any policies not meeting company compliance standards.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions