DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description.
DRAG DROP Place the steps in the correct packet-processing order of operations.
I don’t think it’s A here. App-ID is for identifying applications, not devices. Device-ID does the device discovery/classification, which is what IoT security profiles need. Sometimes easy to mix them up because both are core Palo Alto features! Pretty sure B is correct but open to other thoughts if I missed something.
Pretty sure it's A here since App-ID does all the application classification, and I think IoT profiles would use that to identify devices. Device-ID sounds more about user logins to me. If the question's really asking about device types on the network, seems like App-ID could fit too.
AMan, Palo loves making these sound trickier than they are. B imo, application filter is what you want since it auto-includes any new high-risk apps in future content updates. Static group (C) wouldn't keep up. Seen similar in practice tests so pretty confident here.

Anyone double-checked if "engress outside" (B) is actually first in policy order? Remember from a mock that ordering matters, since firewall applies rules top to bottom. Just want to confirm we're all reading the zones right.
Yeah, A and B here. MPLS and broadband internet are the usual SD-WAN transports you see for path selection. USB tethering and loopbacks aren’t really used in real deployments for this purpose. Pretty sure that's what they're after here, but let me know if I'm missing something obvious.
I get why most people say A and D, but I’m still drawn to B. If you want to recategorize how an app appears in traffic logs, creating a custom application seems like the move-especially if default categorization isn’t suitable. Maybe I’m off, but isn’t customizing for policy mapping also common? Could be a trap though if Palo Alto expects "main reasons" to mean just identification and unknown traffic.
A and D make sense here. Custom apps in PAN firewalls are really about making sure you can identify internal apps that App-ID doesn't recognize (A), plus cutting down on unknown traffic entries in the logs (D). B is more about app categorization, not the main use. Pretty sure this is right, but happy to discuss if anyone disagrees.
Don't think B is right here. The real purpose of custom applications in PAN-OS is to properly identify internal or proprietary traffic (that's A), and also to cut down on all the unknown-tcp/udp noise (that's D). B looks like a trap since recategorizing isn't the main use case. Anyone else see it this way?
DRAG DROP Place the following steps in the packet processing order of operations from first to last.
DoS protection → Security policy lookup → content inspection → QOS shaping applied. That order lines up with what I've seen in practice and from Palo Alto docs. DoS has to catch attacks at ingress, then security policy checks, then does the deep packet inspection, and QoS wraps things up before sending out. Pretty sure on this but let me know if you see it differently.
DRAG DROP Match each feature to the DoS Protection Policy or the DoS Protection Profile.



