A security administrator needs to block access to a specific list of 500 malicious domains. These domains are updated daily by a third-party intelligence feed. What is the most efficient way to manage these domains as an object?
An analyst wants to create a custom application for an internal tool that uses a specific proprietary protocol. Which information is required to ensure the firewall correctly identifies this application using App-ID?
A financial company is deploying NGFWs with the Advanced SD-WAN subscription to improve uptime and bandwidth across thousands of ATMs. The company requires that traffic flows to the internal application needed by the ATMs always use the path with the lowest latency and packet loss.
Which unique SD-WAN rule parameters meet this criteria?
A company wants to ensure that any file uploaded to a specific cloud storage provider is immediately analyzed for malware, even if the file has never been seen before. Which action should be set in the WildFire Analysis Profile?
An administrator is using Strata Cloud Manager (SCM) and notices that several firewalls are reporting a low health score due to "Untrusted Certificates" being used for management. Which specific SCM dashboard provides the fastest way to identify which certificates are nearing expiration across the entire estate?
A user reports that a specific business application is dropping connection every few minutes. The analyst wants to see if the firewall's session table is reaching its limit for that specific user. Which tool should the analyst use?
An analyst wants to ensure that any traffic from the "Guest-Zone" to the "Internal-Zone" is always inspected, even if there is no explicit security rule defined. Which default behavior should the analyst be aware of?
An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?
What is the purpose of the "Config Audit" feature in Panorama?
Which type of object should be used to ensure that a Security policy rule automatically updates when a new virtual machine is spun up in a public cloud environment and assigned a specific tag?
An analyst is creating a "Data Pattern" for DLP that needs to match a specific 10-digit customer account number that always starts with the letters "ACC". Which pattern type should be used?
What is the benefit of the Command Center’s centralized dashboard in Strata Cloud Manager (SCM)?
A financial institution must comply with a regulation that prohibits the decryption of any traffic destined for "Banking" or "Healthcare" websites. How should the analyst implement this requirement while still decrypting other web traffic?
When performing a "Push to Devices" from Panorama, an analyst wants to ensure that the push only affects a specific firewall in a shared Device Group. Which option in the push window allows this granular selection?
A Palo Alto Networks NGFW for a high-security environment is being configured and requires a security profile group that includes vulnerability protection. When configuring the action based on the severity of the threat types, what does Palo Alto Networks recommend? (Choose one answer)
When pushing a configuration from Panorama to multiple firewalls, an analyst wants to ensure that a specific local interface setting on one firewall is not overwritten by the template value. Which feature should be used?
An organization uses several different web-conferencing tools (Zoom, Microsoft Teams, WebEx). The analyst wants to create a single security rule to allow all these tools without listing each App-ID individually. What should the analyst create?
Which SCM feature allows an administrator to see a "Safety Score" for a proposed policy change before it is committed to the firewalls?
How often should external dynamic lists be updated to ensure effective Security policy enforcement?
A security administrator is creating an address object for a partner organization whose public IP address is unknown but who always uses a specific domain name. Which address object type should be used?
In a Zero Trust environment, why is it recommended to use "User-ID" instead of just IP addresses in Security policy rules?
Which object allows an analyst to group different applications together based on a specific business function, such as "Social-Media" or "Collaboration," to simplify policy management?