A security analyst is using the Strata Cloud Manager (SCM) Policy Optimizer to create specific and focused rules. The analyst accepts the new rules from Policy Optimizer and updates the rule base, but the traffic does not hit these new rules.
Which action needs to be taken to resolve this issue?
A firewall is showing high "Packet Buffer" utilization, causing network latency. Which type of traffic is most likely to cause this issue if it is not correctly managed?
Which SCM feature allows an administrator to see a "Safety Score" for a proposed policy change before it is committed to the firewalls?
How often should external dynamic lists be updated to ensure effective Security policy enforcement?
A company wants to ensure that all internal users are prevented from uploading sensitive documents to a specific personal cloud storage site. Which Security profile is specifically designed to inspect the content of file transfers for specific data patterns?
A firewall administrator implementing Palo Alto Networks best practices on the company firewall reviews NGFW alerts in Strata Cloud Manager (SCM) and determines that one alert does not apply to this environment. If the administrator has no intention to resolve the underlying issue, what is the appropriate next step?
An analyst notices that a security rule intended to block a specific application is being bypassed. Upon investigation, the analyst finds that the traffic is matching a rule higher in the list. Which tool provides a visual "Shadowing" check to identify rules that will never be hit?
What is the purpose of the "Config Audit" feature in Panorama?
An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.
Which configuration adjustment should be implemented to ensure secure access to the applications?
DNS rewrite can only be configured on a NAT rule with which type of destination address translation?
TESTED 18 Mar 2026