01. Which approach provides the most comprehensive coverage for preventing data loss across endpoints, network, and SaaS applications?
a) Network-based DLP only
b) Endpoint DLP only
c) Enterprise DLP with policy-based enforcement
d) URL Filtering categories
02. When designing global Prisma Access deployments, which factor most directly impacts private application performance?
a) Number of firewall rules
b) Regional placement of service connections
c) Log retention duration
d) Panorama template hierarchy
03. An organization needs to inspect sensitive data being uploaded to sanctioned SaaS applications in real time while also scanning data stored within those applications. Which architecture best meets this requirement?
a) SaaS Security Inline combined with Enterprise DLP
b) SaaS API Security only
c) SSPM without inline enforcement
d) URL Filtering only
04. What is the primary difference between on-ramp and off-ramp architectures in Prisma Access?
a) On-ramp handles outbound traffic; off-ramp handles inbound traffic
b) On-ramp connects users and branches; off-ramp connects private apps and services
c) On-ramp requires SD-WAN; off-ramp does not
d) On-ramp is cloud-only; off-ramp is on-premises only
05. An enterprise wants to provide private application access without exposing internal IP addresses and while enforcing Zero Trust principles. Which design best achieves this goal?
a) NAT-based access through internet gateways
b) GlobalProtect full-tunnel VPN
c) ZTNA Connectors using FQDN-based access
d) Remote networks with static routing
06. Which service provides centralized identity awareness for NGFW, Prisma Access, and Prisma SD-WAN?
a) Cortex XDR
b) User-ID agents only
c) Panorama
d) Cloud Identity Engine
07. An organization wants to allow traffic only if it can be continuously scanned for malware and exploits, even when applications are explicitly permitted. Which design principle supports this requirement?
a) Continuous security inspection of allowed traffic
b) Implicit trust for sanctioned applications
c) Network isolation without threat inspection
d) Static allow rules without profiles
08. Why are dedicated log collectors recommended in large-scale environments?
a) To simplify policy creation
b) To improve log scalability and resilience
c) To eliminate the need for Panorama
d) To replace SIEM integrations
09. Which analytics capability helps validate Zero Trust effectiveness by detecting abnormal behavior over time?
a) Manual log review
b) Packet captures on demand
c) Static security rule counters
d) Continuous monitoring and behavioral analytics
10. A security architect must differentiate between network segmentation and microsegmentation when designing a Zero Trust architecture. Which statement correctly describes microsegmentation?
a) It separates networks using physical firewalls between VLANs
b) It enforces access control at the application and workload level
c) It relies primarily on IP subnet isolation
d) It replaces identity-based security policies