Beyond being a SaaS-based delivery platform, what is an advantage of Strata Cloud Manager (SCM) over Panorama? (Choose one answer)
An analyst is configuring a "WildFire Analysis Profile." Which file types can be sent to the WildFire cloud for sandbox analysis?
A Palo Alto Networks NGFW for a high-security environment is being configured and requires a security profile group that includes vulnerability protection. When configuring the action based on the severity of the threat types, what does Palo Alto Networks recommend? (Choose one answer)
A user reports that they are being blocked from a website with a "Certificate Error." Which log will help the analyst determine if the firewall is blocking the session because the web server is using an expired certificate?
Which action ensures that a Panorama push will not fail due to pending local firewall changes?
Which log type should be checked first using Log Viewer when a user reports being unable to access a specific website?
Which Strata Cloud Manager (SCM) feature provides a consolidated view of all high-priority security incidents across a global network, including those from firewalls and Prisma Access?
What is the purpose of the "Config Audit" feature in Panorama?
An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?
Which aspect of a network’s current health does the Strata Cloud Manager (SCM) Device Health dashboard provide?
When performing a "Push to Devices" from Panorama, an analyst wants to ensure that the push only affects a specific firewall in a shared Device Group. Which option in the push window allows this granular selection?
A security administrator needs to block access to a specific list of 500 malicious domains. These domains are updated daily by a third-party intelligence feed. What is the most efficient way to manage these domains as an object?
An analyst notices that a security rule intended to block a specific application is being bypassed. Upon investigation, the analyst finds that the traffic is matching a rule higher in the list. Which tool provides a visual "Shadowing" check to identify rules that will never be hit?
A company requires that all encrypted traffic from the "Accounting" department be decrypted for inspection, while all other departments remain encrypted. How should the analyst configure the Decryption Policy?
What is the benefit of the Command Center’s centralized dashboard in Strata Cloud Manager (SCM)?
An analyst is investigating why an App-ID for a custom application is showing as "unknown-tcp" in the Traffic logs. The application is running on port 8080. What is the most likely cause of this identification failure?
A company requires that all file transfers only over HTTP (tcp/80 and tcp/8080) to SaaS storage must be inspected for data exfiltration. Traffic to encrypted HTTPS SaaS storage cannot be inspected based on the company decryption restrictions.
When using a security profile group, which Security policy configuration meets this requirement?
An analyst needs to prevent users from downloading executable files from "High-Risk" URL categories while allowing them from "Business-and-Economy." Which profile should be configured to achieve this specific file-type restriction?
Which log type is the most useful for identifying if a user is repeatedly attempting to visit an "Unauthorized" website category that is being blocked by a security profile?
A company wants to implement a security policy that only allows "web-browsing" if it is initiated by an authorized user. If the user is not identified, they should be prompted to authenticate via a web portal. Which policy type must be configured to trigger this portal?
An organization uses several different web-conferencing tools (Zoom, Microsoft Teams, WebEx). The analyst wants to create a single security rule to allow all these tools without listing each App-ID individually. What should the analyst create?
An analyst needs to configure a NAT policy to allow internal users to access the internet. The company only has one public IP address available on the firewall's outside interface. Which NAT type should be used?