Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the benefit of the Command Center’s centralized dashboard in Strata Cloud Manager (SCM)?

A.

Monitoring encryption for network performance optimization

B.

Using AI to predict and prevent potential security incidents

C.

Automatically patching security vulnerabilities

D.

Monitoring and managing threats and operational health

An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.

Which configuration adjustment should be implemented to ensure secure access to the applications?

A.

Apply Disable Server Response Inspection (DSRI) to the existing Security policy to allow the non-standard ports.

B.

Disable App-ID and port filtering and rely solely on IP addresses of the applications to allow the non-standard ports.

C.

Clone the existing Security policy rule and include the non-standard ports under services.

D.

Clone the existing Security policy rule and include unknown-tcp and unknown-udp applications with service set to “any”

Which log type should be checked first using Log Viewer when a user reports being unable to access a specific website?

A.

Firewall/URL

B.

Firewall/Traffic

C.

Firewall/Threat

D.

Firewall/DNS Security

In a Zero Trust environment, why is it recommended to use "User-ID" instead of just IP addresses in Security policy rules?

A.

To allow the firewall to perform hardware-level decryption.

B.

IP addresses are dynamic and do not provide persistent identity in modern networks.

C.

User-ID is required to enable the "application-default" service setting.

D.

Using User-ID reduces the CPU load on the Management Plane.

There are intermittent connectivity issues between two internal zones on a PA-Series firewall. Although the Security policies appear correctly configured, traffic between the zones is experiencing unexpected drops. Which troubleshooting step will isolate the root cause of this behavior?

A.

Use the CLI command tcpdump filter and set the source and destination zones in the filter to capture and analyze traffic flows between zones, checking for packet loss on the data plane.

B.

Use the CLI command show system info to monitor CPU and memory usage, ensuring that resource constraints are not causing interfaces to drop packets between zones.

C.

Use the PAN-OS GUI Troubleshooting tool to review interface status, verify zone assignments, and confirm that all links are operational.

D.

Use the CLI command show system state filter sys.sl.* | match Error to find interface errors across all the interfaces.

A Palo Alto Networks NGFW for a high-security environment is being configured and requires a security profile group that includes vulnerability protection. When configuring the action based on the severity of the threat types, what does Palo Alto Networks recommend? (Choose one answer)

A.

Use action “reset-both” for critical, high, and medium vulnerabilities.

B.

Use action “alert” for critical, high, and medium vulnerabilities.

C.

Use action “allow” for critical, high, and medium vulnerabilities.

D.

Use action “default” for critical, high, and medium vulnerabilities.

A financial company is deploying NGFWs with the Advanced SD-WAN subscription to improve uptime and bandwidth across thousands of ATMs. The company requires that traffic flows to the internal application needed by the ATMs always use the path with the lowest latency and packet loss.

Which unique SD-WAN rule parameters meet this criteria?

A.

Application/Service: "Internal Application for ATMs" → Path Selection: "Best Available Path" in Traffic Distribution Profile.

B.

Application/Service: "Internal Application for ATMs" & "Management" in Path Quality Profile → Path Selection "Any."

C.

Application/Service: "Internal Application for ATMs" → Path Selection "Weighted Distribution" in Traffic Distribution Profile.

D.

Application/Service: "Internal Application for ATMs" & "ATM Path(Custom)" in Path Quality Profile → Path Selection "Any."

An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?

A.

Policy Optimizer

B.

Rule Comparison

C.

ACC (Application Command Center)

D.

Config Audit

A financial institution must comply with a regulation that prohibits the decryption of any traffic destined for "Banking" or "Healthcare" websites. How should the analyst implement this requirement while still decrypting other web traffic?

A.

Set the default Decryption Profile to "No-Decrypt."

B.

Create a Decryption Policy with the action "No Decrypt" and select the relevant URL categories.

C.

Add the banking URLs to the "External Dynamic List."

D.

Use a NAT policy to bypass the SSL engine for those categories.

A company wants to implement a security policy that only allows "web-browsing" if it is initiated by an authorized user. If the user is not identified, they should be prompted to authenticate via a web portal. Which policy type must be configured to trigger this portal?

A.

Security Policy

B.

Authentication Policy

C.

Decryption Policy

D.

NAT Policy