B and C look right, but does "all employees" mean literally everyone logs in at the same moment? If it was staggered, maybe the pending request cap wouldn’t be as much of an issue. Official guide covers these limits pretty well.
Is it asking for the "best way" or just a valid method? If it wants most robust, filtering (B) stands out, but if it means "any method," others might fit.
Yeah, A is what you need here. To use RBI with Prisma Access for mobile users, the URLs to be isolated are set using a URL access management profile, and "Isolate" is the key action. Then you link that profile to your Security policy so it takes effect. Saw a similar one in practice dumps and pretty sure this is the way Palo Alto wants it. Anyone see it done different?
Option D is the one that lets you create dynamic policies using Entra ID attributes as source. The other choices are more about mapping or static groups, not policy automation. Pretty sure this is what Palo Alto wants here, though let me know if you see it differently.
Option C is correct based on the docs and past practice exams. If you check "Disable Server Response Inspection," all server-to-client traffic skips threat inspection, no matter what profile is there. Some people mix this up with B, but the threat profile doesn't override that checkbox. Quick question: if the rule was for a non-HTTP app only, would that change the right pick here?
Yeah, it's C. Once you tick that box, Palo Alto skips threat inspection for all traffic coming from server to client, regardless of the profile. B is a common trap because people assume the profile can override it, but it can't. Seen similar confusion on practice questions.