What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?
Answer : C
Which action would an administrator take to ensure that a service object will be available only to the selected device group?
Answer : D
https://docs.paloaltonetworks.com/panorama/9-0/panorama-admin/manage-firewalls/manage-device-groups/create-objects-for-use-in-shared-or-device-group-policy
Which set of options is available for detailed logs when building a custom report on a Palo Alto Networks NGFW?
Answer : B
When building a custom report on a Palo Alto Networks NGFW, you can select detailed logs that provide specific insights into various aspects of firewall activity. The available options for detailed logs typically include:
Traffic logs: These provide information on the network traffic passing through the firewall.
Threat logs: These logs capture data related to identified security threats, such as malware or intrusion attempts.
Data filtering logs: These logs capture events related to data filtering policies, such as preventing the transfer of sensitive data.
User-ID logs: These logs associate user identities with the traffic and activities observed on the firewall, enabling user-based policy enforcement.
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Answer : A, B
An administrator is reviewing another administrator s Security policy log settings
Which log setting configuration is consistent with best practices tor normal traffic?
Answer : B
What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?
Answer : B

How frequently can wildfire updates be made available to firewalls?
Answer : D