What helps avoid split brain in active-passive high availability (HA) pair deployment?
What helps avoid split brain in active-passive high availability (HA) pair deployment?A . Using a standard traffic interface as the HA2 backupB . Enabling preemption on both firewall s in the HA pairC . Using the management interface as the HA1 backup linkD . Using a standard traffic interface as...
What can software next-generation firewall (NGFW) credits be used to provision?
What can software next-generation firewall (NGFW) credits be used to provision?A . Remote browser isolationB . Virtual Panorama appliancesC . Migrating NGFWs from hardware to VMsD . Enablement of DNS securityView AnswerAnswer: B
Where do CN-Series devices obtain a VM-Series authorization key?
Where do CN-Series devices obtain a VM-Series authorization key?A . PanoramaB . Local installationC . GitHubD . Customer Support PortalView AnswerAnswer: A
What are two environments supported by the CN-Series firewall ? (Choose two.)
What are two environments supported by the CN-Series firewall ? (Choose two.)A . Positive KB . OpenShiftC . OpenStackD . Native K8View AnswerAnswer: BD
What is a design consideration for a prospect who wants to deploy VM-Series firewall s in an Amazon Web Services (AWS) environment?
What is a design consideration for a prospect who wants to deploy VM-Series firewall s in an Amazon Web Services (AWS) environment?A . Special AWS plugins are needed for load balancing.B . Resources are shared within the cluster.C . Only active-passive high availability (HA) is supported.D . High availability (HA)...
Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?
Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?A . OCSPB . Secure Sockets Layer (SSL) Inbound InspectionC . Advanced URL Filtering (AURLF)D . WildFireView AnswerAnswer: B
Which element protects and hides an internal network in an outbound flow ?
Which element protects and hides an internal network in an outbound flow ?A . DNS sinkholingB . User-IDC . App-IDD . NATView AnswerAnswer: D
Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)
Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)A . Intelligent Traffic OffloadB . Threat PreventionC . WildFireD . SD-WANView AnswerAnswer: BC
What do tags allow a VM-Series firewall to do in a virtual environment?
What do tags allow a VM-Series firewall to do in a virtual environment?A . Enable machine learning (ML).B . Adapt Security policy rules dynamically.C . Integrate with security information and event management (SIEM) solutions.D . Provide adaptive reporting.View AnswerAnswer: B
Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)
Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)A . Prism CentralB . BootstrapC . Service ClusterD . Host-basedView AnswerAnswer: CD