SASE Flashcards
A customer currently uses a third-party proxy solution for client endpoints and would like to migrate to Prisma Access to secure mobile user internet-bound traffic. Which recommendation should the Systems Engineer make to this customer?
A. With the explicit proxy license add-on, set up GlobalProtect.
B. With the mobile user license, set up explicit proxy.
C. With the explicit proxy license, set up a service connection.
D. With the mobile user license, set up a corporate access node.
B. With the mobile user license, set up explicit proxy.
What is a benefit of deploying secure access service edge (SASE) with a secure web gateway (SWG) over a SASE solution without a SWG?
A. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down.
B. It prepares the keys and certificates required for decryption, creating decryption profiles and policies, and configuring decryption port mirroring.
C. Protection is offered in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites.
D. It creates tunnels that allow users and systems to connect securely over a public network as if they were connecting over a local area network (LAN).
C. Protection is offered in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites.
Which action protects against port scans from the internet?
A. Apply App-ID Security policy rules to block traffic sourcing from the untrust zone.
B. Assign Security profiles to Security policy rules for traffic sourcing from the untrust zone.
C. Apply a Zone Protection profile on the zone of the ingress interface.
D. Assign an Interface Management profile to the zone of the ingress surface.
C. Apply a Zone Protection profile on the zone of the ingress interface.
Which product continuously monitors each segment from the endpoint to the application and identifies baseline metrics for each application?
A. App-ID Cloud Engine (ACE)
B. Autonomous Digital Experience Management (ADEM)
C. CloudBlades
D. WildFire
B. Autonomous Digital Experience Management (ADEM)
Which application gathers health telemetry about a device and its WiFi connectivity in order to help determine whether the device or the WiFi is the cause of any performance issues?
A. data loss prevention (DLP)
B. remote browser isolation (RBI)
C. Cortex Data Lake
D. GlobalProtect
D. GlobalProtect
What is a differentiator between the Palo Alto Networks secure access service edge (SASE) solution and competitor solutions?
A. path analysis
B. playbooks
C. ticketing systems
D. inspections
A. path analysis
Which secure access service edge (SASE) networking component inspects web-based protocols and traffic to securely connect users to applications?
A. proxy
B. SD-WAN
C. secure web gateway (SWG)
D. cloud access security broker (CASB)
C. secure web gateway (SWG)
What is a benefit of the Palo Alto Networks secure access service edge (SASE) solution’s ability to provide insight into SD-WAN and network security metrics while highlighting critical issues across all managed tenants?
A. It rearchitects the way signatures are delivered, performing updates and streaming them to the firewall within seconds after the analysis is done.
B. It helps protect inbound, outbound, and east-west traffic between container workload types in Kubernetes environments without slowing development speed.
C. It simplifies workflows and instantly automates common use cases with hundreds of prebuilt playbooks.
D. It helps managed service providers (MSPs) accelerate troubleshooting and meet service level agreements (SLAs) for all their customers.
D. It helps managed service providers (MSPs) accelerate troubleshooting and meet service level agreements (SLAs) for all their customers.
Which component of the secure access service edge (SASE) solution provides complete session protection, regardless of whether a user is on or off the corporate network?
A. Zero Trust
B. threat prevention
C. single-pass architecture (SPA)
D. DNS Security
A. Zero Trust
In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
A. Step 4: Create the Zero Trust Policy
B. Step 3: Architect a Zero Trust Network
C. Step 1: Define the Protect Surface
D. Step 5: Monitor and Maintain the Network
A. Step 4: Create the Zero Trust Policy
In the aggregate model, how are bandwidth allocations and interface tags applied beginning in Prisma Access 1.8?
A. License bandwidth is allocated to a CloudGenix controller; interface tags are set with a compute region.
B. License bandwidth is allocated to a compute region; interface tags are set with a CloudGenix controller.
C. License bandwidth is allocated to a compute region; interface tags are set with a Prisma Access location.
D. License bandwidth is allocated to a Prisma Access location; interface tags are set with a compute region.
C. License bandwidth is allocated to a compute region; interface tags are set with a Prisma Access location.
Which three decryption methods are available in a security processing node (SPN)? (Choose three.)
A. SSL Outbound Proxy
B. SSHv2 Proxy
C. SSL Forward Proxy
D. SSL Inbound Inspection
E. SSH Inbound Inspection
B. SSHv2 Proxy
C. SSL Forward Proxy
D. SSL Inbound Inspection
Which App Response Time metric measures the amount of time it takes to transfer incoming data from an external server to a local client?
A. UDP Response Time (UDP-TRT)
B. Server Response Time (SRT)
C. Network Transfer Time (NTTn)
D. Round Trip Time (RTT)
C. Network Transfer Time (NTTn)
Which two prerequisites must an environment meet to onboard Prisma Access mobile users? (Choose two.)
A. Zoning must be configured to require a user ID for the mobile users trust zone.
B. Mapping of trust and untrust zones must be configured.
C. BGP must be configured so that service connection networks can be advertised to the mobile gateways.
D. Mobile user subnet and DNS portal name must be configured.
B. Mapping of trust and untrust zones must be configured.
D. Mobile user subnet and DNS portal name must be configured.
How does SaaS Security Inline help prevent the data security risks of unsanctioned security-as-a-service (SaaS) application usage on a network?
A. It provides mobility solutions and/or large-scale virtual private network (VPN) capabilities.
B. It offers risk scoring, analytics, reporting, and Security policy rule authoring.
C. It provides built-in external dynamic lists (EDLs) that secure the network against malicious hosts.
D. It prevents credential theft by controlling sites to which users can submit their corporate credentials.
B. It offers risk scoring, analytics, reporting, and Security policy rule authoring.
Which two point products are consolidated into the Prisma secure access service edge (SASE) platform? (Choose two.)
A. Autonomous Digital Experience Management (ADEM)
B. firewall as a service (FWaaS)
C. Threat Intelligence Platform (TIP)
D. security information and event management (SIEM)
A. Autonomous Digital Experience Management (ADEM)
B. firewall as a service (FWaaS)
Which element of Prisma Access enables both mobile users and users at branch networks to access resources in headquarters or a data center?
A. User-ID
B. private clouds
C. App-ID
D. service connections
D. service connections
Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third-party RBI products with which platform?
A. Zero Trust
B. SaaS Security API
C. GlobalProtect
D. CloudBlades API
D. CloudBlades API
What is an advantage of the unified approach of the Palo Alto Networks secure access service edge (SASE) platform over the use of multiple point products?
A. It allows for automation of ticketing tasks and management of tickets without pivoting between various consoles.
B. It scans all traffic, ports, and protocols and automatically discovers new apps.
C. It turns threat intelligence and external attack surface data into an intelligent data foundation to dramatically accelerate threat response.
D. It reduces network and security complexity while increasing organizational agility.
D. It reduces network and security complexity while increasing organizational agility.
How does Autonomous Digital Experience Management (ADEM) improve user experience?
A. The root cause of any alert can be viewed with a single click, allowing users to swiftly stop attacks across the environment.
B. The virtual appliance receives and stores firewall logs without using a local Log Collector, simplifying required steps users must take.
C. Working from home or branch offices, all users get the benefit of a digital experience management solution without the complexity of installing additional software and hardware.
D. It applies in-depth hunting and forensics knowledge to identify and contain threats before they become a breach.
C. Working from home or branch offices, all users get the benefit of a digital experience management solution without the complexity of installing additional software and hardware.
What are two ways service connections and remote network connections differ? (Choose two.)
A. Remote network connections provide secondary WAN options, but service connections use backup service connection for redundancy.
B. Remote network connections enforce security policies, but service connections do not.
C. An on-premises resource cannot originate a connection to the internet over a service connection.
D. Service connections support both OSPF and BGP for routing protocols, but remote networks support only BGP.
B. Remote network connections enforce security policies, but service connections do not.
C. An on-premises resource cannot originate a connection to the internet over a service connection.
What can prevent users from unknowingly downloading potentially malicious file types from the internet?
A. Apply a File Blocking profile to Security policy rules that allow general web access.
B. Apply a Zone Protection profile to the untrust zone.
C. Assign an Antivirus profile to Security policy rules that deny general web access.
D. Assign a Vulnerability profile to Security policy rules that deny general web access.
A. Apply a File Blocking profile to Security policy rules that allow general web access.
How does Autonomous Digital Experience Management (ADEM) simplify troubleshooting?
B. It provides customized forms to collect and validate necessary parameters from the requester.
C. It natively ingests, normalizes, and integrates granular data across the security infrastructure at nearly half the cost of legacy security products attempting to solve the problem.
D. It provides IT teams with single-pane visibility that leverages endpoint, simulated, and real-time user traffic data to provide the most complete picture of user traffic flows possible.
D. It provides IT teams with single-pane visibility that leverages endpoint, simulated, and real-time user traffic data to provide the most complete picture of user traffic flows possible.
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?
A. Enable syslog on the Instant-On Network (ION) device.
B. Use a zone-based firewall to export directly through application program interface (API) to the SIEM.
C. Enable Simple Network Management Protocol (SNMP) on the Instant-On Network (ION) device.
D. Use the centralized flow data-export tool built into the controller.
A. Enable syslog on the Instant-On Network (ION) device.
Users connect to a server in the data center for file sharing. The organization wants to decrypt the traffic to this server in order to scan the files being uploaded and downloaded to determine if malware or sensitive data is being moved by users.
Which proxy should be used to decrypt this traffic?
A. SCP Proxy
B. SSL Inbound Proxy
C. SSH Forward Proxy
D. SSL Forward Proxy
B. SSL Inbound Proxy
Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)
A. The devices continually sync the information from directories, whether they are on-premise, cloud-based, or hybrid.
B. The devices establish VPNs over private WAN circuits that share a common service provider.
C. The devices automatically establish a VPN to the data centers over every internet circuit.
D. The devices provide an abstraction layer between the Prisma SD-WAN controller and a particular cloud service.
B. The devices establish VPNs over private WAN circuits that share a common service provider.
C. The devices automatically establish a VPN to the data centers over every internet circuit.