Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

Palo Alto Networks PSE-SASE Exam Actual Questions

The questions for PSE-SASE were last updated on April 29, 2024.
  • Viewing page 1 out of 17 pages.
  • Viewing questions 1-4 out of 65 questions

Topic 1 - Exam A

Question #1 Topic 1

A customer currently uses a third-party proxy solution for client endpoints and would like to migrate to Prisma Access to secure mobile user internet-bound traffic.
Which recommendation should the Systems Engineer make to this customer?

  • A. With the explicit proxy license add-on, set up GlobalProtect.
  • B. With the mobile user license, set up explicit proxy.
  • C. With the explicit proxy license, set up a service connection.
  • D. With the mobile user license, set up a corporate access node.
Reveal Solution Hide Solution   Discussion   7

Correct Answer: B 🗳️

Question #2 Topic 1

What is a benefit of deploying secure access service edge (SASE) with a secure web gateway (SWG) over a SASE solution without a SWG?

  • A. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down.
  • B. It prepares the keys and certificates required for decryption, creating decryption profiles and policies, and configuring decryption port mirroring.
  • C. Protection is offered in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites.
  • D. It creates tunnels that allow users and systems to connect securely over a public network as if they were connecting over a local area network (LAN).
Reveal Solution Hide Solution   Discussion   4

Correct Answer: C 🗳️

Question #3 Topic 1

Which action protects against port scans from the internet?

  • A. Apply App-ID Security policy rules to block traffic sourcing from the untrust zone.
  • B. Assign Security profiles to Security policy rules for traffic sourcing from the untrust zone.
  • C. Apply a Zone Protection profile on the zone of the ingress interface.
  • D. Assign an Interface Management profile to the zone of the ingress surface.
Reveal Solution Hide Solution   Discussion   4

Correct Answer: C 🗳️

Question #4 Topic 1

Which product continuously monitors each segment from the endpoint to the application and identifies baseline metrics for each application?

  • A. App-ID Cloud Engine (ACE)
  • B. Autonomous Digital Experience Management (ADEM)
  • C. CloudBlades
  • D. WildFire
Reveal Solution Hide Solution   Discussion   3

Correct Answer: B 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...