Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

Paloalto Networks PSE-SASE Dumps

Page: 1 / 2
Total 65 questions

Palo Alto Networks System Engineer Professional - SASE Exam Questions and Answers

Question 1

What is an advantage of the Palo Alto Networks cloud-based security infrastructure?

Options:

A.

It provides comprehensive, scalable cloud security with flexible licensing options.

B.

It backhauls traffic to the corporate network.

C.

It allows for the elimination of data centers within five years of implementation.

D.

It increases the footprint of the security solution.

Question 2

Which application gathers health telemetry about a device and its WiFi connectivity in order to help determine whether the device or the WiFi is the cause of any performance issues?

Options:

A.

data loss prevention (DLP)

B.

remote browser isolation (RBI)

C.

Cortex Data Lake

D.

GlobalProtect

Question 3

What is a differentiator between the Palo Alto Networks secure access service edge (SASE) solution and competitor solutions?

Options:

A.

path analysis

B.

playbooks

C.

ticketing systems

D.

inspections

Question 4

Which product enables organizations to open unknown files in a sandbox environment and scan them for malware or other threats?

Options:

A.

network sandbox

B.

SD-WAN

C.

cloud access security broker (CASB)

D.

remote browser isolation

Question 5

Which type of access allows unmanaged endpoints to access secured on-premises applications?

Options:

A.

manual external gateway

B.

secure web gateway (SWG)

C.

GlobalProtect VPN for remote access

D.

Prisma Access Clientless VPN

Question 6

In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?

Options:

A.

Step 4: Create the Zero Trust policy

B.

Step 3: Architect a Zero Trust network

C.

Step 1: Define the protect surface

D.

Step 5: Monitor and maintain the network

Question 7

Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?

Options:

A.

Cloud Identity Engine (CIE)

B.

DNS Security

C.

security information and event management (SIEM)

D.

Device Insights

Question 8

In which step of the Five-Step Methodology for implementing the Zero Trust model is the Kipling Method relevant?

Options:

A.

Step 3: Architect a Zero Trust network

B.

Step 5: Monitor and maintain the network

C.

Step 4: Create the Zero Trust policy

D.

Step 2: Map the transaction flows

Question 9

Which two prerequisites must an environment meet to onboard Prisma Access mobile users? (Choose two.)

Options:

A.

Zoning must be configured to require a user ID for the mobile users trust zone.

B.

Mapping of trust and untrust zones must be configured.

C.

BGP must be configured so that service connection networks can be advertised to the mobile gateways.

D.

Mobile user subnet and DNS portal name must be configured.

Page: 1 / 2
Total 65 questions