Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does a firewall behave when SSL Inbound Inspection is enabled?

A.

It acts transparently between the client and the internal server.

B.

It decrypts inbound and outbound SSH connections.

C.

It decrypts traffic between the client and the external server.

D.

It acts as meddler-in-the-middle between the client and the internal server.

How does Strata Logging Service help resolve ever-increasing log retention needs for a company using Prisma Access?

A.

It increases resilience due to decentralized collection and storage of logs.

B.

Automatic selection of physical data storage regions decreases adoption time.

C.

It can scale to meet the capacity needs of new locations as business grows.

D.

Log traffic using the licensed bandwidth purchased for Prisma Access reduces overhead.

Which subscription sends non-file format-based traffic that matches Data Filtering Profile criteria to a cloud service to render a verdict?

A.

Enterprise DLP

B.

Advanced URL Filtering

C.

SaaS Security Inline

D.

Advanced WildFire

A cloud security architect is designing a certificate management strategy for Strata Cloud Manager (SCM) across hybrid environments. Which practice ensures optimal security with low management overhead?

A.

Deploy centralized certificate automation with standardized protocols and continuous monitoring.

B.

Implement separate certificate authorities with independent validation rules for each cloud environment.

C.

Configure manual certificate deployment with quarterly reviews and environment-specific security protocols.

D.

Use cloud provider default certificates with scheduled synchronization and localized renewal processes.

How many places will a firewall administrator need to create and configure a custom data loss prevention (DLP) profile across Prisma Access and the NGFW?

A.

One

B.

Two

C.

Three

D.

Four

Which two security services are required for configuration of NGFW Security policies to protect against malicious and misconfigured domains? (Choose two.)

A.

Advanced Threat Prevention

B.

SaaS Security

C.

Advanced WildFire

D.

Advanced DNS Security

A network security engineer has created a Security policy in Prisma Access that includes a negated region in the source address. Which configuration will ensure there is no connectivity loss due to the negated region?

A.

Set the service to be application-default.

B.

Create a Security policy for the negated region with destination address “any”.

C.

Add a Dynamic Application Group to the Security policy.

D.

Add all regions that contain private IP addresses to the source address.

Which two features can a network administrator use to troubleshoot the issue of a Prisma Access mobile user who is unable to access SaaS applications? (Choose two.)

A.

SaaS Application Risk Portal

B.

Capacity Analyzer

C.

GlobalProtect logs

D.

Autonomous Digital Experience Manager (ADEM) console

Which action is only taken during slow path in the NGFW policy?

A.

Session lookup

B.

Layer 2—Layer 4 firewall processing

C.

SSL/TLS decryption

D.

Security policy lookup

Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)

A.

App-ID

B.

Service

C.

User-ID

D.

Schedule