A network security engineer wants to forward Strata Logging Service data to tools used by the Security Operations Center (SOC) for further investigation. In which best practice step of Palo Alto Networks Zero Trust does this fit?
Which AI-powered solution provides unified management and operations for NGFWs and Prisma Access?
During a security incident investigation, which Security profile will have logs of attempted confidential data exfiltration?
An administrator wants to implement additional Cloud-Delivered Security Services (CDSS) on a data center NGFW that already has one enabled. What benefit does the NGFW’s single-pass parallel processing (SP3) architecture provide?
Which feature of SaaS Security will allow a firewall administrator to identify unknown SaaS applications in an environment?
Which two tools can be used to configure Cloud NGFWs for AWS? (Choose two.)
A network security engineer has created a Security policy in Prisma Access that includes a negated region in the source address. Which configuration will ensure there is no connectivity loss due to the negated region?
A company has an ongoing initiative to monitor and control IT-sanctioned SaaS applications. To be successful, it will require configuration of decryption policies, along with data filtering and URL Filtering Profiles used in Security policies. Based on the need to decrypt SaaS applications, which two steps are appropriate to ensure success? (Choose two.)
Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)
Which GlobalProtect configuration is recommended for granular security enforcement of remote user device posture?
Which security profile provides real-time protection against threat actors who exploit the misconfigurations of DNS infrastructure and redirect traffic to malicious domains?
In a Prisma SD-WAN environment experiencing voice quality degradation, which initial action is recommended?
How can a firewall administrator block a list of 300 unique URLs in the most time-efficient manner?
A cloud security architect is designing a certificate management strategy for Strata Cloud Manager (SCM) across hybrid environments. Which practice ensures optimal security with low management overhead?