Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

SSE-Engineer Palo Alto Networks Security Service Edge Engineer Questions and Answers

Questions 4

Where are tags applied to control access to Generative AI when implementing AI Access Security?

Options:

A.

To Generative AI applications for identifying sanctioned, tolerated, or unsanctioned applications

B.

To security rules for defining which types of Generative AI applications are allowed or blocked

C.

To user devices for identifying and controlling which Generative AI applications they can access

D.

To Generative AI URL categories for classifying trusted and untrusted Generative AI websites

Buy Now
Questions 5

An engineer deploys a new branch connected to Prisma Access. From the customer premises equipment (CPE) device at the branch, Phase 1 on the tunnel is established, but Phase 2-encrypted packets are not coming back from Prisma Access.

Which Strata Logging Service log facility should the engineer review to determine why Phase 2-encrypted traffic is not being received?

Options:

A.

Decrypt logs

B.

System logs

C.

Traffic logs

D.

Tunnel logs

Buy Now
Questions 6

A company has a Prisma Access deployment for mobile users in North America and Europe. Service connections are deployed to the data centers on these continents, and the data centers are connected by private links.

With default routing mode, which action will verify that traffic being delivered to mobile users traverses the service connection in the appropriate regions?

Options:

A.

Configure BGP on the customer premises equipment (CPE) to prefer the assigned community string attribute on the mobile user prefixes in its respective Prisma Access region.

B.

Configure each service connection to filter out the mobile user pool prefixes from the other region in the advertisements to the data center.

C.

Configure BGP on the customer premises equipment (CPE) to prefer the MED attribute on the mobile user prefixes in its respective Prisma Access region.

D.

Configure each service connection to prepend the BGP ASN five times for mobile user pool prefixes originating from the other region.

Buy Now
Questions 7

An engineer has configured IPSec tunnels for two remote network locations; however, users are experiencing intermittent connectivity issues across the tunnels.

What action will allow the engineer to receive notifications when the IPSec tunnels are down or experiencing instability?

Options:

A.

Create a new notification profile specifying conditions for remote network IPSec tunnels.

B.

Create a tunnel log notification rule to alert on specified remote network IPSec tunnel conditions.

C.

Set up the operational health dashboard to email alerts for remote Network IPSec tunnel issues.

D.

Select the IPSec tunnel monitoring and notifications checkbox when configuring the remote network IPSec tunnels.

Buy Now
Questions 8

When a review of devices discovered by IoT Security reveals network routers appearing multiple times with different IP addresses, which configuration will address the issue by showing only unique devices?

Options:

A.

Add the duplicate entries to the ignore list in IoT Security.

B.

Merge individual devices into a single device with multiple interfaces.

C.

Create a custom role to merge devices with the same hostname and operating system.

D.

Delete all duplicate devices, keeping only those discovered using their management IP addresses.

Buy Now
Questions 9

Which advanced AI-powered functionality does Strata Copilot provide to enhance the capabilities of Prisma Access security teams?

Options:

A.

Real-time traffic analysis for automated threat prevention

B.

Initial configuration of Prisma Access using a natural language interface

C.

Customized guidance for resolving issues through recommended next steps

D.

Automated remediation of misconfigured security policies

Buy Now
Questions 10

A customer is implementing Prisma Access (Managed by Strata Cloud Manager) to connect mobile users, branch locations, and business-to- business (B2B) partners to their data centers.

The solution must meet these requirements:

The mobile users must have internet filtering, data center connectivity, and remote site connectivity to the branch locations.

The branch locations must have internet filtering and data center connectivity.

The B2B partner connections must only have access to specific data center internally developed applications running on non-standard ports.

The security team must have access to manage the mobile user and access to branch locations.

The network team must have access to manage only the partner access.

How should Prisma Access be implemented to meet the customer requirements?

Options:

A.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the Strata Multitenant Cloud Manager Prisma Access configuration scope to manage access.

B.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the Prisma Access Configuration scope to manage all access.

C.

Deploy two Prisma Access instances - the first with mobile users, remote networks, and private access for all internal connection types, and the second with remote networks and private application access for B2B connections - and use the specific configuration scope for the connection type to manage access.

D.

Deploy a Prisma Access instance with mobile users, remote networks, and private access for all connection types, and use the specific configuration scope for the connection type to manage access.

Buy Now
Questions 11

A large retailer has deployed all of its stores with the same IP address subnet. An engineer is onboarding these stores as Remote Networks in Prisma Access. While onboarding each store, the engineer selects the “Overlapping Subnets” checkbox.

Which Remote Network flow is supported after onboarding in this scenario?

Options:

A.

To private applications

B.

To the internet

C.

To remote network

D.

To mobile users

Buy Now
Questions 12

An engineer has configured a new Remote Networks connection using BGP for route advertisements. The IPSec tunnel has been established, but the BGP peer is not up.

Which two elements must the engineer validate to solve the issue? (Choose two.)

Options:

A.

Secret

B.

MRAI Timers

C.

Peer AS Number

D.

Advertise Default Route Checkbox

Buy Now
Questions 13

An intern is tasked with changing the Anti-Spyware Profile used for security rules defined in the GlobalProtect folder. All security rules are using the Default Prisma Profile. The intern reports that the options are greyed out and cannot be modified when selecting the Default Prisma Profile.

Based on the image below, which action will allow the intern to make the required modifications?

SSE-Engineer Question 13

Options:

A.

Request edit access for the GlobalProtect scope.

B.

Change the configuration scope to Prisma Access and modify the profile group.

C.

Create a new profile, because default profile groups cannot be modified.

D.

Modify the existing anti-spyware profile, because best-practice profiles cannot be removed from a group.

Buy Now
Questions 14

A large retailer has deployed all of its stores with the same IP address subnet. An engineer is onboarding these stores as Remote Networks in Prisma Access. While onboarding each store, the engineer selects the “Overlapping Subnets” checkbox.

Which Remote Network flow is supported after onboarding in this scenario?

Options:

A.

To private applications

B.

To the internet

C.

To remote network

D.

To mobile users

Buy Now
Questions 15

How can an engineer use risk score customization in SaaS Security Inline to limit the use of unsanctioned SaaS applications by employees within a Security policy?

Options:

A.

Lower the risk score of sanctioned applications and increase the risk score for unsanctioned applications.

B.

Increase the risk score for all SaaS applications to automatically block unwanted applications.

C.

Build an application filter using unsanctioned SaaS as the category.

D.

Build an application filter using unsanctioned SaaS as the characteristic.

Buy Now
Exam Code: SSE-Engineer
Exam Name: Palo Alto Networks Security Service Edge Engineer
Last Update: Apr 16, 2025
Questions: 50

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now SSE-Engineer testing engine

PDF (Q&A)

$36.75  $104.99
buy now SSE-Engineer pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Apr 2025