Looking for more? Click here to get the full PDF with 84+ practice questions for $10 for offline study and deeper preparation.
Question 1
Which element of Prisma Access enables both mobile users and users at branch networks to access resources in headquarters or a data center?
A. User-ID
B. private clouds
C. App-ID
D. service connections
Show Answer
Correct Answer:
D. service connections
Question 2
Text of question will be provided later...A. It applies configuration changes and provides credential management, role-based controls, and a playbook repository.
A. It provides customized forms to collect and validate necessary parameters from the requester
B. It natively ingests, normalizes, and integrates granular data across the security infrastructure at nearly half the cost of legacy security products attempting to solve the problem
C. It provides IT teams with single-pane visibility that leverages endpoint, simulated, and real-time user traffic data to provide the most complete picture of user traffic flows possible
Show Answer
Correct Answer:
D. undefined
Question 3
Which application gathers health telemetry about a device and its WiFi connectivity in order to help determine whether the device or the WiFi is the cause of any performance issues?
A. data loss prevention (DLP)
B. remote browser isolation (RBI)
C. Cortex Data Lake
D. GlobalProtect
Show Answer
Correct Answer:
D. GlobalProtect
Question 4
Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)
A. The devices continually sync the information from directories, whether they are on-premise, cloud-based, or hybrid
B. The devices establish VPNs over private WAN circuits that share a common service provider
C. The devices automatically establish a VPN to the data centers over every internet circuit
D. The devices provide an abstraction layer between the Prisma SD-WAN controller and a particular cloud service
Show Answer
Correct Answer:
B. The devices establish VPNs over private WAN circuits that share a common service provider
C. The devices automatically establish a VPN to the data centers over every internet circuit
Question 5
Which two prerequisites must an environment meet to onboard Prisma Access mobile users? (Choose two.)
A. Zoning must be configured to require a user ID for the mobile users trust zone
B. Mapping of trust and untrust zones must be configured
C. BGP must be configured so that service connection networks can be advertised to the mobile gateways
D. Mobile user subnet and DNS portal name must be configured
Show Answer
Correct Answer:
B. Mapping of trust and untrust zones must be configured
D. Mobile user subnet and DNS portal name must be configured
Question 6
A customer is concerned about performance of their SaaS applications for all end-users. Their users are globally distributed and access local SaaS applications services within their country. When troubleshooting end-to-end connectivity, they want the quickest way to identify common issues across the entire organization in order to be proactive and remediate them before the end-user needs to open a support ticket. Which two features would provide visibility and performance enhancements for the customer's SaaS application access? (Choose two.)
A. Prisma Access Browser
B. ADEM
C. Prisma SD-WAN
D. App Acceleration
Show Answer
Correct Answer:
B. ADEM
D. App Acceleration
Question 7
Users connect to a server in the data center for file sharing. The organization wants to decrypt the traffic to this server in order to scan the files being uploaded and downloaded to determine if malware or sensitive data is being moved by users. Which proxy should be used to decrypt this traffic?
A. SCP Proxy
B. SSL Inbound Proxy
C. SSH Forward Proxy
D. SSL Forward Proxy
Show Answer
Correct Answer:
D. SSL Forward Proxy
Question 8
Which App Response Time metric measures the amount of time it takes to transfer incoming data from an external server to a local client?
A. UDP Response Time (UDP-TRT)
B. Server Response Time (SRT)
C. Network Transfer Time (NTTn)
D. Round Trip Time (RTT)
Show Answer
Correct Answer:
C. Network Transfer Time (NTTn)
Question 9
A current Prisma SASE customer has recently onboarded several new SaaS applications, and they are concerned about their security posture regarding administrative settings. The IT team does not have experience with these applications, and is unsure what the best base security settings would be. Which product would fit the customer's needs?
A. IoT Security
B. Prisma SD-WAN
C. SSPM
D. SaaS Security
Show Answer
Correct Answer:
C. SSPM
Question 10
Over half the devices on a company's networks are unmanaged, and the company has been relying on traditional security measures. They are looking for a product to provide protection from costly security breaches. Which Palo Alto product would solve this use case?
A. Prisma CASB
B. Prisma Access
C. GlobalProtect
D. Prisma Access Browser
Show Answer
Correct Answer:
D. Prisma Access Browser
Question 11
In which step of the Five-Step Methodology for implementing the Zero Trust model is the Kipling Method relevant?
A. Step 3: Architect a Zero Trust network
B. Step 5: Monitor and maintain the network
C. Step 4: Create the Zero Trust policy
D. Step 2: Map the transaction flows
Show Answer
Correct Answer:
C. Step 4: Create the Zero Trust policy
Question 12
How does Prisma Access enhance visibility and control over SaaS applications?
A. Through SaaS Security Posture Management (SSPM)
B. By employing Content Delivery Network (CDN) capabilities
C. Through centralized logging in Strata Logging Service
D. By using AIOps for SASE
Show Answer
Correct Answer:
A. Through SaaS Security Posture Management (SSPM)
Question 13
Which Prisma Access component ensures consistent security policy enforcement across all users?
A. Cloud Management
B. SSL Decryption
C. User-ID
D. Data Loss Prevention
Show Answer
Correct Answer:
A. Cloud Management
Question 14
Which element of a secure access service edge (SASE)-enabled network provides true integration of services, not service chains, with combined services and visibility for all locations, mobile users, and the cloud?
A. identity and network location
B. broad network-edge support
C. converged WAN edge and network security
D. cloud-native, cloud-based delivery
Show Answer
Correct Answer:
C. converged WAN edge and network security
Question 15
Which secure access service edge (SASE) networking component inspects web-based protocols and traffic to securely connect users to applications?
A. proxy
B. SD-WAN
C. secure web gateway (SWG)
D. cloud access security broker (CASB)
Show Answer
Correct Answer:
C. secure web gateway (SWG)
Question 16
How does the secure access service edge (SASE) security model provide cost savings to organizations?
A. The single platform reduces costs compared to buying and managing multiple point products
B. The compact size of the components involved reduces overhead costs, as less physical space is needed
C. The content inspection integration allows third-party assessment, which reduces the cost of contract services
D. The increased complexity of the model over previous products reduces IT team staffing costs
Show Answer
Correct Answer:
A. The single platform reduces costs compared to buying and managing multiple point products
Question 17
Which element of a secure access service edge (SASE)-enabled network uses many points of presence to reduce latency with support of in-country or in-region resources and regulatory requirements?
A. cloud-native, cloud-based delivery
B. converged WAN edge and network security
C. broad network-edge support
D. identity and network location
Show Answer
Correct Answer:
A. cloud-native, cloud-based delivery
Question 18
In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
A. Step 4: Create the Zero Trust Policy
B. Step 3: Architect a Zero Trust Network
C. Step 1: Define the Protect Surface
D. Step 5: Monitor and Maintain the Network
Show Answer
Correct Answer:
A. Step 4: Create the Zero Trust Policy
Question 19
What is a benefit of deploying secure access service edge (SASE) with a secure web gateway (SWG) over a SASE solution without a SWG?
A. heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down
B. It prepares the keys and certificates required for decryption, creating decryption profiles and policies, and configuring decryption port mirroring
C. Protection is offered in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites
D. It creates tunnels that allow users and systems to connect securely over a public network as if they were connecting over a local area network (LAN)
Show Answer
Correct Answer:
C. Protection is offered in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites
Question 20
Cloud-delivered App-ID provides specific identification of which two applications? (Choose two.)
A. unknown-tcp
B. private
C. web-browsing
D. custom
Show Answer
Correct Answer:
A. unknown-tcp
C. web-browsing
Aced these? Get the Full Exam
Download the complete PSE-SASE study bundle with 84+ questions in a single printable PDF.