Seen this type of scenario in a few practice tests, and the docs mention those TCP DNS limits too. B and C are what matter during a massive login burst, since it's all about handling the surge in simultaneous DNS requests. Pretty sure that's what they're testing here, but let me know if you think otherwise.
Yeah, B and C are what make sense for this. Mapping learned from somewhere else or missing HIP checks can break identity-based access, which lines up with the random denies until reconnect. Not 100% but I don’t see how D is right.
Pretty clear it's B. Filtering the prefixes at each service connection makes sure only the right region's user pools are visible to that region's data center, so traffic can't go the wrong way. I saw this logic in a similar exam question. Disagree?
Isn't the official material pretty clear that URL access management profiles are where you specify isolation for RBI? Labs and guides both highlight this step, so practice with them if you're not sure about the config details.
Option D is the one that lets you create dynamic policies using Entra ID attributes as source. The other choices are more about mapping or static groups, not policy automation. Pretty sure this is what Palo Alto wants here, though let me know if you see it differently.
I don’t think B works here. D is the one that handles dynamic Entra ID attributes for policies, so static group answers (like C) are easy to mix up but miss that bigger attribute support. Open to pushback if someone’s used Group Attribute for this though.
Yeah, D makes sense here. Only Cloud Dynamic User Group lets you build policies using any attributes from Entra ID, not just membership in groups. That’s what sets it apart from the other options I think. Correct me if I missed something, but pretty sure D is right for this one.
A unless the question was about post-event forensics, then B could make a case. But Prisma Access traffic replication is meant for live feeds to an internal security device, not just dumping data to cloud storage. Unless they've changed something recently, pretty sure it's A. Anyone see a scenario where you'd specify Panorama directly?
Not convinced B is right here, since that only talks about HTTP. The checkbox actually disables inspection for all server-to-client traffic, not just a single protocol. Saw a similar question in practice and C matched what the doc says.
That checkbox affects all server-to-client traffic, not just HTTP. So with it enabled, every protocol in that direction skips threat inspection, even if there's a profile on the rule. I think C is spot on for this one, unless anyone's seen something different in Panorama?
I don’t think it’s C, I’d have picked B. The question mentions HTTP traffic from server to client, and option B says the profile can still override for HTTP cases. Always thought the override could apply if you’ve got that profile set. Maybe I’m confusing with another feature though.
Option C here. When "Disable Server Response Inspection" is checked, threat inspection is skipped for all server-to-client traffic, no matter what threat profile is set. B sounds like a trap since it mentions HTTP specifically. Seen this phrasing in practice sets, pretty sure C is right-let me know if I missed something!
Option C is correct based on the docs and past practice exams. If you check "Disable Server Response Inspection," all server-to-client traffic skips threat inspection, no matter what profile is there. Some people mix this up with B, but the threat profile doesn't override that checkbox. Quick question: if the rule was for a non-HTTP app only, would that change the right pick here?
Wouldn't a DNS misconfiguration (A) also block the connector from ever reaching the cloud gateway in the first place? If it can't resolve the destination, connection setup should fail outright, not just be unreliable. Double NAT is definitely tricky, but is DNS really just a red herring here?
D here, official guide and some hands-on labs stress SSL Decryption for actually blocking these SNI mismatch tricks. URL Filtering can log or flag but won’t stop the session. Pretty sure about D but open if anyone saw different on exam sims.
Pretty sure it's D since blocking on SNI mismatch actually kills the session, not just logs it. C is more about detection or alerting. SSL Decryption with that block action really stops this type of evasion. Open if anyone's seen a trick to get C to fully block though.