New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator needs to generate a monthly report showing the "Top Applications" by bandwidth usage across all branch sites to justify a bandwidth upgrade.

Which specific component of the Prisma SD-WAN interface is designed to create, schedule, and email these PDF summaries?

A.

 Activity Charts

B.

 Media Analytics

C.

 Reports

D.

 Flow Browser

When configuring a Path Policy rule for a "Real-Time Video" application, the administrator wants to ensure the traffic uses the path with the lowest packet loss.

How does the Prisma SD-WAN ION determine the "Packet Loss" metric for a given path when there is no active user traffic flowing on that link?

A.

 It sends Active Probes (synthetic UDP packets) across the Secure Fabric to measure path quality continuously.

B.

 It relies solely on Passive Monitoring of TCP retransmissions from other user traffic on that link.

C.

 It queries the ISP's router via SNMP to retrieve interface error counters.

D.

 It defaults to a static value of 0% loss until user traffic begins.

An ION 3000 device at a remote branch has suffered a critical hardware failure and must be replaced via the RMA process. The administrator has received the replacement unit.

What is the correct procedure to transfer the configuration and license from the defective unit to the replacement unit to ensure minimal downtime and retention of historical data?

A.

 Manually configure the new device from scratch, then open a support ticket to transfer the license.

B.

 Use the "Replace Device" workflow in the Prisma SD-WAN portal, which automatically transfers the configuration (Device Shell) and re-associates the site to the new serial number.

C.

 Backup the configuration of the old device to a USB drive and restore it to the new device using the local console.

D.

 Delete the old device from the portal, create a new site for the replacement device, and rebuild the policies manually.

In a Prisma SD-WAN deployment, what is the defining characteristic of a "Standard VPN" compared to a "Secure Fabric Link"?

A.

 Standard VPNs use GRE encapsulation, while Secure Fabric Links use VXLAN.

B.

 Standard VPNs are automatically built between ION devices, while Secure Fabric Links require manual configuration.

C.

 Standard VPNs are manually configured IPSec tunnels to non-ION endpoints, while Secure Fabric Links are automated tunnels between ION devices.

D.

 Standard VPNs support BGP, whereas Secure Fabric Links only support static routing.

What is the default action for real-time media applications if link performance is poor?

A.

Drop the flow.

B.

Move flows.

C.

Apply Forward Error Correction (FEC).1

D.

Raise an alarm.

A network engineer is troubleshooting an ION device that is showing as "Offline" in the Prisma SD-WAN portal, despite the site reporting that local internet access is working. The engineer has console access to the device.

Which CLI command should be used to specifically validate the device's ability to resolve the controller's hostname and establish a secure connection to it over a specific interface?

A.

 ping

B.

 debug controller reachability

C.

 show system connectivity

D.

 dump vpn summary

In which modes can a Prisma SD-WAN branch be deployed?

A.

Testing, Control, POV

B.

Production, Control, Disabled

C.

Disabled, Analytics, Control

D.

POV, Production, Analytics

An administrator wants to configure a Path Policy that routes all "Guest Wi-Fi" traffic directly to the internet using the local broadband interface, bypassing all VPN tunnels.

Which Service & DC Group setting should be selected in the policy rule to achieve this "Direct Internet Access" (DIA) behavior?

A.

 Standard VPN

B.

 Direct

C.

 Any-Private

D.

 Default-Cluster

User-ID integration is configured for a Prisma SD-WAN deployment. Branch-1 has the user-to-IP mappings available, and User-1 is mapped to IP-1.

To which two use cases can User-ID based zone-based firewall policies be applied? (Choose two.)

A.

User-1 accessing a SaaS application on direct internet and source User-ID based zone-based firewall rules on Branch-1 ION

B.

User-1 accessing a private application within Branch-1, and source User-ID based zone-based firewall rules on Branch-1 ION

C.

User-1 accessing a private application in data center via SD-WAN overlay, and destination User-ID based zone-based firewall rules on DC ION

D.

User-1 accessing a private application in Branch-2 via SD-WAN overlay, and destination User-ID based zone-based firewall rules on Branch-2 ION

What is the default behavior of the Zone-Based Firewall (ZBFW) for traffic originating from the ION device itself (e.g., DNS queries, NTP sync, or Controller connectivity) destined for the "Internet" zone?

A.

 It is denied by the default "Deny All" rule unless explicitly allowed.

B.

 It is allowed by the implicit "Self-Zone" allow rule.

C.

 It is allowed only if the "Management" interface is used.

D.

 It is inspected by the "Global" security stack but bypasses local rules.