An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.
Which configuration adjustment should be implemented to ensure secure access to the applications?
In a Zero Trust environment, why is it recommended to use "User-ID" instead of just IP addresses in Security policy rules?
An analyst is configuring a "WildFire Analysis Profile." Which file types can be sent to the WildFire cloud for sandbox analysis?
Which action ensures that sensitive information such as medical records, financial transactions, and legal communications are not decrypted and that they maintain strong security?
Which aspect of a network’s current health does the Strata Cloud Manager (SCM) Device Health dashboard provide?
An analyst is configuring a security policy to allow an application that uses a dynamic range of ports. Instead of opening a wide range of ports, which Palo Alto Networks feature should be leveraged to identify the application based on its unique payload?
Which log type should be checked first using Log Viewer when a user reports being unable to access a specific website?
DNS rewrite can only be configured on a NAT rule with which type of destination address translation?
A company requires that all file transfers only over HTTP (tcp/80 and tcp/8080) to SaaS storage must be inspected for data exfiltration. Traffic to encrypted HTTPS SaaS storage cannot be inspected based on the company decryption restrictions.
When using a security profile group, which Security policy configuration meets this requirement?
What is the most granular method for ensuring that traffic to a firewall’s public IP address on the public interface is translated to the private IP address of the web server?
A firewall is showing high "Packet Buffer" utilization, causing network latency. Which type of traffic is most likely to cause this issue if it is not correctly managed?
Which feature allows the firewall to automatically identify and categorize IoT (Internet of Things) devices based on their unique network behavior?
A Palo Alto Networks NGFW for a high-security environment is being configured and requires a security profile group that includes vulnerability protection. When configuring the action based on the severity of the threat types, what does Palo Alto Networks recommend? (Choose one answer)
What is the function of a "Service" object in a Palo Alto Networks firewall configuration?
An administrator is using Strata Cloud Manager (SCM) and notices that several firewalls are reporting a low health score due to "Untrusted Certificates" being used for management. Which specific SCM dashboard provides the fastest way to identify which certificates are nearing expiration across the entire estate?
An analyst notices an unusual amount of bandwidth being consumed by "web-browsing" traffic. Which ACC tab provides a breakdown of which specific URLs and URL Categories are responsible for this bandwidth usage?
A security analyst is using the Strata Cloud Manager (SCM) Policy Optimizer to create specific and focused rules. The analyst accepts the new rules from Policy Optimizer and updates the rule base, but the traffic does not hit these new rules.
Which action needs to be taken to resolve this issue?
A user reports that they can reach a website, but the page elements are not loading correctly. The analyst suspects that a security profile is silently dropping some of the web content. Which log, when filtered by the user's IP, will show the specific Content-ID match that is causing the partial page failure?
What is an important consideration when defining custom data patterns for data loss prevention (DLP) on Palo Alto Networks platforms? (Choose one answer)