Which software firewall would help a prospect interested in securing an environment with Kubernetes?
Which software firewall would help a prospect interested in securing an environment with Kubernetes?A . KN-SeriesB . ML-SeriesC . VM-SeriesD . CN-SeriesView AnswerAnswer: D
Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?
Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?A . Boundary automationB . Hypervisor integrationC . BootstrappingD . Dynamic Address GroupView AnswerAnswer: D
Which two statements apply to the VM-Series plugin? (Choose two.)
Which two statements apply to the VM-Series plugin? (Choose two.)A . It can manage capabilities common to both VM-Series firewall s and hardware firewall s.B . It can be upgraded independently of PAN-OS.C . It enables management of cloud-specific interactions between VM-Series firewall s and supported public cloud platforms.D ....
Which offering inspects encrypted outbound traffic?
Which offering inspects encrypted outbound traffic?A . WildFireB . TLS decryptionC . Content-IDD . Advanced URL Filtering (AURLF)View AnswerAnswer: B
How does a CN-Series firewall prevent ex fi ltration?
How does a CN-Series firewall prevent ex fi ltration?A . It employs custom-built signatures based on hash.B . It distributes incoming virtual private cloud (VPC) traffic across the pool of VM-Series firewall s.C . It provides a license deactivation API key.D . It inspects outbound traffic content and blocks suspicious...
Which component scans for threats in allowed traffic?
Which component scans for threats in allowed traffic?A . Intelligent Traffic OffloadB . TLS decryptionC . Security profilesD . NATView AnswerAnswer: C
Which two actions can be performed for VM-Series firewall licensing by an orchestration system? (Choose two.)
Which two actions can be performed for VM-Series firewall licensing by an orchestration system? (Choose two.)A . Creating a licenseB . Renewing a licenseC . Registering an authorization codeD . Downloading a content updateView AnswerAnswer: BC
How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?
How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?A . It must be deployed as a member of a device cluster.B . It must use a Layer 3 underlay network.C . It must receive all forwarding lookups from...
How can this partition be accomplished without editing the IP addresses or the default gateways of any of the guest VMs?
A customer in a VMware ESXi environment wants to add a VM-Series firewall and partition an existing group of virtual machines (VMs) in the same subnet into two groups. One group requires no additional security, but the second group requires substantially more security. How can this partition be accomplished without...
What does the number of required flex credits for a VM-Series firewall depend on?
What does the number of required flex credits for a VM-Series firewall depend on?A . vCPU allocationB . IP address allocationC . Network interface allocationD . Memory allocationView AnswerAnswer: A