Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SSE-Engineer Paloalto Networks Palo Alto Networks Security Service Edge Engineer Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Paloalto Networks SSE-Engineer Palo Alto Networks Security Service Edge Engineer certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 50 questions

When using the traffic replication feature in Prisma Access, where is the mirrored traffic directed for analysis?

A.

Specified internal security appliance

B.

Dedicated cloud storage location

C.

Panorama

D.

Strata Cloud Manager (SCM)

Strata Logging Service is configured to forward logs to an external syslog server; however, a month later, there is a disruption on the syslog server.

Which action will send the missing logs to the external syslog server?

A.

Configure a replay profile with the affected time range and associate it with the affected syslog server profile.

B.

Delete the affected syslog server profile and create a new one.

C.

Export the logs from Strata Logging Service, and then manually import them to the syslog server.

D.

Configure a log filter under the syslog server profile with the affected time range.

Which feature within Strata Cloud Manager (SCM) allows an operations team to view applications, threats, and user insights for branch locations for both NGFW and Prisma Access simultaneously?

A.

Command Center

B.

Log Viewer

C.

Branch Site Monitor

D.

SASE Health Dashboard

Which policy configuration in Prisma Access Browser (PAB) will protect an organization from malicious BYOD and minimize the impact on the user experience?

A.

One that blocks file exchange

B.

One for session recording

C.

One that blocks elements such as screen scrapers

D.

One that allows access to applications with data masking or watermarking

An engineer has configured IPSec tunnels for two remote network locations; however, users are experiencing intermittent connectivity issues across the tunnels.

What action will allow the engineer to receive notifications when the IPSec tunnels are down or experiencing instability?

A.

Create a new notification profile specifying conditions for remote network IPSec tunnels.

B.

Create a tunnel log notification rule to alert on specified remote network IPSec tunnel conditions.

C.

Set up the operational health dashboard to email alerts for remote Network IPSec tunnel issues.

D.

Select the IPSec tunnel monitoring and notifications checkbox when configuring the remote network IPSec tunnels.

A user connected to Prisma Access reports that traffic intermittently is denied after matching a Catch-All Deny rule at the bottom and bypassing HIP-based policies. Refreshing VPN connection restores the access.

What are two reasons for this behavior? (Choose two.)

A.

"Collect HIP data' needs to be enabled in the configuration.

B.

User mapping is learned from sources other than gateway authentication.

C.

Firewall loses user mapping due to missed HIP report checks.

D.

HIP-enforced policy is scheduled for certain hours of the day.

A customer is implementing Prisma Access (Managed by Strata Cloud Manager) to connect mobile users, branch locations, and business-to- business (B2B) partners to their data centers.

The solution must meet these requirements:

The mobile users must have internet filtering, data center connectivity, and remote site connectivity to the branch locations.

The branch locations must have internet filtering and data center connectivity.

The B2B partner connections must only have access to specific data center internally developed applications running on non-standard ports.

The security team must have access to manage the mobile user and access to branch locations.

The network team must have access to manage only the partner access.

How should Prisma Access be implemented to meet the customer requirements?

A.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the Strata Multitenant Cloud Manager Prisma Access configuration scope to manage access.

B.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the Prisma Access Configuration scope to manage all access.

C.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the specific configuration scope for the connection type to manage access.

D.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the specific configuration scope for the connection type to manage access.

An intern is tasked with changing the Anti-Spyware Profile used for security rules defined in the GlobalProtect folder. All security rules are using the Default Prisma Profile. The intern reports that the options are greyed out and cannot be modified when selecting the Default Prisma Profile.

Based on the image below, which action will allow the intern to make the required modifications?

A.

Request edit access for the GlobalProtect scope.

B.

Change the configuration scope to Prisma Access and modify the profile group.

C.

Create a new profile, because default profile groups cannot be modified.

D.

Modify the existing anti-spyware profile, because best-practice profiles cannot be removed from a group.

A company has a Prisma Access deployment for mobile users in North America and Europe. Service connections are deployed to the data centers on these continents, and the data centers are connected by private links.

With default routing mode, which action will verify that traffic being delivered to mobile users traverses the service connection in the appropriate regions?

A.

Configure BGP on the customer premises equipment (CPE) to prefer the assigned community string attribute on the mobile user prefixes in its respective Prisma Access region.

B.

Configure each service connection to filter out the mobile user pool prefixes from the other region in the advertisements to the data center.

C.

Configure BGP on the customer premises equipment (CPE) to prefer the MED attribute on the mobile user prefixes in its respective Prisma Access region.

D.

Configure each service connection to prepend the BGP ASN five times for mobile user pool prefixes originating from the other region.

An engineer has configured a new Remote Networks connection using BGP for route advertisements. The IPSec tunnel has been established, but the BGP peer is not up.

Which two elements must the engineer validate to solve the issue? (Choose two.)

A.

Secret

B.

MRAI Timers

C.

Peer AS Number

D.

Advertise Default Route Checkbox

Which two statements apply when a customer has a large branch office with employees who all arrive and log in within a five-minute time period? (Choose two.)

A.

DNS results are only cached for frequently used hostnames.

B.

Maximum pending TCP DNS requests is 64.

C.

Maximum number of TCP DNS retries is 3.

D.

DNS results are cached for 300 seconds.

Based on the image below, which two statements describe the reason and action required to resolve the errors? (Choose two.)

A.

The client is misconfigured.

B.

Create a do not decrypt rule for the hostname “google.com.”

C.

The server has pinned certificates.

D.

Create a do not decrypt rule for the hostname “certificates.godaddy.com.”

What must be configured to accurately report an application's availability when onboarding a discovered application for ZTNA Connector?

A.

icmp ping

B.

https ping

C.

tcp ping

D.

udp ping

Which overlay protocol must a customer premises equipment (CPE) device support when terminating a Partner Interconnect-based Colo-Connect in Prisma Access?

A.

Geneve

B.

IPSec

C.

GRE

D.

DTLS

How can a network security team be granted full administrative access to a tenant's configuration while restricting access to other tenants by using role-based access control (RBAC) for Panorama Managed Prisma Access in a multitenant environment?

A.

Create an Access Domain and restrict access to only the Device Groups and Templates for the Target Tenant.

B.

Create a custom role enabling all privileges within the specific tenant's scope and assign it to the security team's user accounts.

C.

Create a custom role with Device Group and Template privileges and assign it to the security team's user accounts.

D.

Set the administrative accounts for the security team to the "Superuser" role.

Page: 1 / 1
Total 50 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved