Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SSE-Engineer VCE Exam Download

Palo Alto Networks Security Service Edge Engineer Questions and Answers

Question 9

An engineer configures User-ID redistribution from an on-premises firewall connected to Prisma Access (Managed by Panorama) using a service connection. After committing the configuration, traffic from remote network connections is still not matching the correct user-based policies.

Which two configurations need to be validated? (Choose two.)

Options:

A.

Ensure the Remote_Network_Template is selected when adding the User-ID Agent in Panorama.

B.

Confirm there is a Security policy configured in Prisma Access to allow the communication on port 5007.

C.

Confirm the Collector Pre-Shared Keys match between Prisma Access and the on-premises firewall.

D.

Ensure the Service_Conn_Template is selected when adding the User-ID Agent in Panorama.

Question 10

An engineer deploys a new branch connected to Prisma Access. From the customer premises equipment (CPE) device at the branch, Phase 1 on the tunnel is established, but Phase 2-encrypted packets are not coming back from Prisma Access.

Which Strata Logging Service log facility should the engineer review to determine why Phase 2-encrypted traffic is not being received?

Options:

A.

Decrypt logs

B.

System logs

C.

Traffic logs

D.

Tunnel logs

Question 11

Which statement is valid in relation to certificates used for GlobalProtect and pre-logon?

Options:

A.

A public certificate authority (CA) must sign and validate all certificates used.

B.

The certificate used for pre-logon must include both Subject and Subject-Alt fields.

C.

Certificates must be deployed in the Machine Certificate Store.

D.

The GlobalProtect agent may be used to distribute pre-logon certificates.

Question 12

In addition to creating a Security policy, how can an AI Access Security be used to prevent users from uploading financial information to ChatGPT?

Options:

A.

Apply File Blocking to stop file uploads containing financial information.

B.

Configure an Enterprise DLP rule to block uploads containing financial information.

C.

Add the ChatGPT domains using URL Filtering to block uploads containing financial information.

D.

Apply a vulnerability profile to stop attempts to exploit system flaws or gain unauthorized access to financial systems.