Exam Code : PSE-SASE
Exam Name : Palo Alto Networks System Engineer Professional - SASE (PSE-SASE)
Vendor Name :
"Palo-Alto"
PSE-SASE Dumps PSE-SASE Braindumps
PSE-SASE Real Questions PSE-SASE Practice Test PSE-SASE Actual Questions
Palo Alto Networks System Engineer Professional - SASE (PSE-SASE)
https://killexams.com/pass4sure/exam-detail/PSE-SASE
In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
Step 4: Create the Zero Trust Policy
Step 3: Architect a Zero Trust Network
Step 1: Define the Protect Surface
Step 5: Monitor and Maintain the Network
Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)
The devices continually sync the information from directories, whether they are on-premise, cloud-based, or hybrid.
The devices establish VPNs over private WAN circuits that share a common service provider.
The devices automatically establish a VPN to the data centers over every internet circuit.
The devices provide an abstraction layer between the Prisma SD-WAN controller and a particular cloud service.
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?
Enable syslog on the Instant-On Network (ION) device.
Use a zone-based firewall to export directly through application program interface (API) to the SIE
Enable Simple Network Management Protocol (SNMP) on the Instant-On Network (ION) device.
Use the centralized flow data-export tool built into the controller.
How does the secure access service edge (SASE) security model provide cost savings to organizations?
The single platform reduces costs compared to buying and managing multiple point products.
The compact size of the components involved reduces overhead costs, as less physical space is needed.
The content inspection integration allows third-party assessment, which reduces the cost of contract services.
The increased complexity of the model over previous products reduces IT team staffing costs.
Which statement applies to Prisma Access licensing?
Internet of Things (IOT) Security is included with each license.
It provides cloud-based, centralized log storage and aggregation.
It is a perpetual license required to enable support for multiple virtual systems on PA-3200 Series firewalls.
For remote network and Clean Pipe deployments, a unit is defined as 1 Mbps of bandwidth.
Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?
Cloud Identity Engine (CIE)
DNS Security
security information and event management (SIEM)
Device Insights
Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?
Cloud-Delivered Security Services (CDSS)
WildFire
CloudBlades:
Autonomous Digital Experience Management (ADEM)
What is a key benefit of CloudBlades?
automation of UI workflow without any code development and deployment of Prisma SD-WAN ION devices
utilization of near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats
identification of port-based rules so they can be converted to application-based rules without compromising application availability
configuration of the authentication source once instead of for each authentication method used
A customer currently uses a third-party proxy solution for client endpoints and would like to migrate to Prisma Access to secure mobile user internet-bound traffic.
Which recommendation should the Systems Engineer make to this customer?
With the explicit proxy license add-on, set up GlobalProtect.
With the mobile user license, set up explicit proxy.
With the explicit proxy license, set up a service connection.
With the mobile user license, set up a corporate access node.
What are two benefits of installing hardware fail-to-wire port pairs on Instant-On Network (ION) devices? (Choose two.)
local area network (LAN) Dynamic Host Configuration Protocol (DHCP) and DHCP relay functionality
control mode insertion without modification of existing network configuration
network controller communication and monitoring
ensures automatic failover when ION devices experience software or network related failure
How does SaaS Security Inline provide a consistent management experience?
user credentials required before accessing the resource
uses advanced predictive analysis and machine learning (ML)
automatically forwards samples for WildFire analysis
integrates with existing security
Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?
remote browser isolation
secure web gateway (SWG)
network sandbox
DNS Security
Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third- party RBI products with which platform?
Zero Trust
SaaS Security API
GlobalProtect
CloudBlades API
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
Step 4: Create the Zero Trust policy
Step 3: Architect a Zero Trust network
Step 1: Define the protect surface
Step 5: Monitor and maintain the network
The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)
throughput of remote networks purchased
cloud-managed or Panorama-managed deployment
retention period for the logs to be stored
number of log-forwarding destinations
number of mobile users purchased
Which elements of Autonomous Digital Experience Management (ADEM) help provide end-to-end visibility of everything in an organization's environment?
integrated threat intelligence management, automated distribution to enforcement points at scale, full ticket mirroring
scanning of all traffic, ports, and protocols
data collected from endpoint devices, synthetic monitoring tests, and real-time traffic
alerts, artifacts, and MITRE tactics
What is a benefit of a cloud-based secure access service edge (SASE) infrastructure over a Zero Trust Network Access (ZTNA) product based on a software-defined perimeter (SDP) model?
Users, devices, and apps are identified no matter where they connect from.
Connection to physical SD-WAN hubs in ther locations provides increased interconnectivity between branch offices.
Complexity of connecting to a gateway is increased, providing additional protection.
Virtual private network (VPN) services are used for remote access to the internal data center, but not the cloud.
Which product allows advanced Layer 7 inspection, access control, threat detection and prevention?
Infrastructure as a Service (IaaS)
remote browser isolation
network sandbox
Firewall as a Service (FWaaS)