Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Paloalto Networks SSE-Engineer Dumps Questions Answers

Palo Alto Networks Security Service Edge Engineer Questions and Answers

Question 1

What must be configured to accurately report an application's availability when onboarding a discovered application for ZTNA Connector?

Options:

A.

icmp ping

B.

https ping

C.

tcp ping

D.

udp ping

Buy Now
Question 2

Based on the image below, which two statements describe the reason and action required to resolve the errors? (Choose two.)

Options:

A.

The client is misconfigured.

B.

Create a do not decrypt rule for the hostname “google.com.”

C.

The server has pinned certificates.

D.

Create a do not decrypt rule for the hostname “certificates.godaddy.com.”

Question 3

Where are tags applied to control access to Generative AI when implementing AI Access Security?

Options:

A.

To Generative AI applications for identifying sanctioned, tolerated, or unsanctioned applications

B.

To security rules for defining which types of Generative AI applications are allowed or blocked

C.

To user devices for identifying and controlling which Generative AI applications they can access

D.

To Generative AI URL categories for classifying trusted and untrusted Generative AI websites

Question 4

An engineer has configured IPSec tunnels for two remote network locations; however, users are experiencing intermittent connectivity issues across the tunnels.

What action will allow the engineer to receive notifications when the IPSec tunnels are down or experiencing instability?

Options:

A.

Create a new notification profile specifying conditions for remote network IPSec tunnels.

B.

Create a tunnel log notification rule to alert on specified remote network IPSec tunnel conditions.

C.

Set up the operational health dashboard to email alerts for remote Network IPSec tunnel issues.

D.

Select the IPSec tunnel monitoring and notifications checkbox when configuring the remote network IPSec tunnels.

Question 5

Which two actions can a company with Prisma Access deployed take to use the Egress IP API to automate policy rule updates when the IP addresses used by Prisma Access change? (Choose two.)

Options:

A.

Configure a webhook to receive notifications of IP address changes.

B.

Copy the Egress IP API Key in the service infrastructure settings.

C.

Enable the Egress IP API endpoint in Prisma Access.

D.

Download a client certificate to authenticate to the Egress IP API.

Question 6

How can a senior engineer use Strata Cloud Manager (SCM) to ensure that junior engineers are able to create compliant policies while preventing the creation of policies that may result in security gaps?

Options:

A.

Use security checks under posture settings and set the action to “deny” for all checks that do not meet the compliance standards.

B.

Configure role-based access controls (RBACs) for all junior engineers to limit them to creating policies in a disabled state, manually review the policies, and enable them using a senior engineer role.

C.

Configure an auto tagging rule in SCM to trigger a Security policy review workflow based on a security rule tag, then instruct junior engineers to use this tag for all new Security policies.

D.

Run a Best Practice Assessment (BPA) at regular intervals and manually revert any policies not meeting company compliance standards.

Question 7

When a review of devices discovered by IoT Security reveals network routers appearing multiple times with different IP addresses, which configuration will address the issue by showing only unique devices?

Options:

A.

Add the duplicate entries to the ignore list in IoT Security.

B.

Merge individual devices into a single device with multiple interfaces.

C.

Create a custom role to merge devices with the same hostname and operating system.

D.

Delete all duplicate devices, keeping only those discovered using their management IP addresses.

Question 8

An engineer has configured a new Remote Networks connection using BGP for route advertisements. The IPSec tunnel has been established, but the BGP peer is not up.

Which two elements must the engineer validate to solve the issue? (Choose two.)

Options:

A.

Secret

B.

MRAI Timers

C.

Peer AS Number

D.

Advertise Default Route Checkbox

Question 9

What is the flow impact of updating the Cloud Services plugin on existing traffic flows in Prisma Access?

Options:

A.

They willexperience latency during the plugin upgrade process.

B.

They will automatically terminate when the upgrade begins.

C.

They will be unaffected because the plugin upgrade is transparent to users.

D.

They will be unaffected only if Panorama is deployed in high availability (HA) mode.

Question 10

A large retailer has deployed all of its stores with the same IP address subnet. An engineer is onboarding these stores as Remote Networks in Prisma Access. While onboarding each store, the engineer selects the “Overlapping Subnets” checkbox.

Which Remote Network flow is supported after onboarding in this scenario?

Options:

A.

To private applications

B.

To the internet

C.

To remote network

D.

To mobile users

Question 11

An engineer has configured IPSec tunnels for two remote network locations; however, users are experiencing intermittent connectivity issues across the tunnels.

What action will allow the engineer to receive notifications when the IPSec tunnels are down or experiencing instability?

Options:

A.

Create a new notification profile specifying conditions for remote network IPSec tunnels.

B.

Create a tunnel log notification rule to alert on specified remote network IPSec tunnel conditions.

C.

Set up the operational health dashboard to email alerts for remote Network IPSec tunnel issues.

D.

Select the IPSec tunnel monitoring and notifications checkbox when configuring the remote network IPSec tunnels.

Question 12

How can an engineer verify that only the intended changes will be applied when modifying Prisma Access policy configuration in Strata Cloud Manager (SCM)?

Options:

A.

Review the SCM portal for blue circular indicators next to each configuration menu item and ensure only the intended areas of configuration have this indicator.

B.

Compare the candidate configuration and the most recent version under "Config Version Snapshots/

C.

Select the most recent job under Operations > Push Status to view the pending changes that would apply to Prisma Access.

D.

Open the push dialogue in SCM to preview all changes which would be pushed to Prisma Access.

Question 13

Strata Logging Service is configured to forward logs to an external syslog server; however, a month later, there is a disruption on the syslog server.

Which action will send the missing logs to the external syslog server?

Options:

A.

Configure a replay profile with the affected time range and associate it with the affected syslog server profile.

B.

Delete the affected syslog server profile and create a new one.

C.

Export the logs from Strata Logging Service, and then manually import them to the syslog server.

D.

Configure a log filter under the syslog server profile with the affected time range.

Question 14

An engineer configures a Security policy for traffic originating at branch locations in the Remote Networks configuration scope. After committing the configuration and reviewing the logs, the branch traffic is not matching the Security policy.

Which statement explains the branch traffic behavior?

Options:

A.

The source address was configured with an address object including the branch location prefixes.

B.

The source zone was configured as “Trust.”

C.

The Security policy did not meet best practice standards and was automatically removed.

D.

The traffic is matching a Security policy in the Prisma Access configuration scope.

Question 15

When a review of devices discovered by IoT Security reveals network routers appearing multiple times with different IP addresses, which configuration will address the issue by showing only unique devices?

Options:

A.

Add the duplicate entries to the ignore list in IoT Security.

B.

Merge individual devices into a single device with multiple interfaces.

C.

Create a custom role to merge devices with the same hostname and operating system.

D.

Delete all duplicate devices, keeping only those discovered using their management IP addresses.