Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which type of Security profile is required to prevent a "Brute Force" attack on a management portal or server by monitoring the rate of connection attempts?

A.

Antivirus Profile

B.

Anti-Spyware Profile

C.

Vulnerability Protection Profile

D.

URL Filtering Profile

An analyst wants to create a custom application for an internal tool that uses a specific proprietary protocol. Which information is required to ensure the firewall correctly identifies this application using App-ID?

A.

Source and Destination IP addresses.

B.

Signature patterns found in the packet payload.

C.

The URL category of the server.

D.

The MAC address of the server.

Which tool should an analyst use to view a real-time, graphical representation of the top applications, users, and threats across the network to identify immediate anomalies?

A.

Log Viewer

B.

ACC (Application Command Center)

C.

Config Audit

D.

Policy Optimizer

A security administrator is creating an internet of things (IoT) Security policy and needs to select behaviors for the traffic.

Which characteristic has the greatest impact to the risk level of applications?

A.

Used by Malware

B.

Pervasive

C.

Tunnels Other Apps

D.

Known Vulnerabilities

A firewall administrator implementing Palo Alto Networks best practices on the company firewall reviews NGFW alerts in Strata Cloud Manager (SCM) and determines that one alert does not apply to this environment. If the administrator has no intention to resolve the underlying issue, what is the appropriate next step?

A.

Click “Copilot” in the top right, and ask the Copilot to make an exception for the NGFW alert.

B.

Assign the NGFW alert to the “Dismiss” user.

C.

Change the NGFW alert priority to “Not Set.”

D.

Open the NGFW alert and click “Suppress” under “Actions.”

To comply with new regulations, a company requires all traffic logs related to the "HR-App" application across all Security policies be sent to a compliance syslog server. A Log Forwarding profile already exists to send logs to a default syslog server.

What is the most efficient process for configuring an NGFW to comply with the new regulations without disrupting existing traffic logs being sent to the default syslog server?

A.

Edit the existing Log Forwarding profile by adding a new match list consisting of Log Forwarding filter for the application named "HR-App" to direct logs to the compliance syslog server.

B.

Create a new Log Forwarding profile, update the profile with the details of the compliance syslog server and attach the profile to the relevant Security policy rule.

C.

Edit the existing Log Forwarding profile, add a new entry, use the filter builder to match on application "HR-App," and add the details for the compliance syslog server.

D.

Create a Log Forwarding profile and enable the predefined filter for "Application" In the associated dropdown, select or create a new application object with the name "HR-App," and add the details for the compliance syslog server.

An analyst wants to allow users to visit "Social Networking" sites but prevent them from posting comments or uploading files. Which combination of Security Profile and Action is required?

A.

URL Filtering Profile set to "Alert" for the category.

B.

URL Filtering Profile using a "URL Filtering Override."

C.

URL Filtering Profile set to "Continue" for the category.

D.

URL Filtering Profile set to "Override" for HTTP Header Insertion.

An administrator is using Strata Cloud Manager (SCM) and notices that several firewalls are reporting a low health score due to "Untrusted Certificates" being used for management. Which specific SCM dashboard provides the fastest way to identify which certificates are nearing expiration across the entire estate?

A.

Command Center

B.

Activity Insights

C.

Policy Optimizer

D.

Device Health Dashboard

How often should external dynamic lists be updated to ensure effective Security policy enforcement?

A.

Once a week

B.

As new threats are identified

C.

Once a month

D.

As frequently as the external source updates

In Strata Cloud Manager (SCM), which logical container is used to group firewalls that share the same configuration requirements, such as those at a specific regional office?

A.

Template Stacks

B.

Snippets

C.

Folders

D.

Device Groups