What helps avoid split brain in active-passive high availability (HA) pair deployment?

What helps avoid split brain in active-passive high availability (HA) pair deployment?A . Using a standard traffic interface as the HA2 backupB . Enabling preemption on both firewall s in the HA pairC . Using the management interface as the HA1 backup linkD . Using a standard traffic interface as...

April 6, 2025 No Comments READ MORE +

What can software next-generation firewall (NGFW) credits be used to provision?

What can software next-generation firewall (NGFW) credits be used to provision?A . Remote browser isolationB . Virtual Panorama appliancesC . Migrating NGFWs from hardware to VMsD . Enablement of DNS securityView AnswerAnswer: B

April 5, 2025 No Comments READ MORE +

Where do CN-Series devices obtain a VM-Series authorization key?

Where do CN-Series devices obtain a VM-Series authorization key?A . PanoramaB . Local installationC . GitHubD . Customer Support PortalView AnswerAnswer: A

April 4, 2025 No Comments READ MORE +

What are two environments supported by the CN-Series firewall ? (Choose two.)

What are two environments supported by the CN-Series firewall ? (Choose two.)A . Positive KB . OpenShiftC . OpenStackD . Native K8View AnswerAnswer: BD

April 2, 2025 No Comments READ MORE +

What is a design consideration for a prospect who wants to deploy VM-Series firewall s in an Amazon Web Services (AWS) environment?

What is a design consideration for a prospect who wants to deploy VM-Series firewall s in an Amazon Web Services (AWS) environment?A . Special AWS plugins are needed for load balancing.B . Resources are shared within the cluster.C . Only active-passive high availability (HA) is supported.D . High availability (HA)...

April 2, 2025 No Comments READ MORE +

Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?

Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?A . OCSPB . Secure Sockets Layer (SSL) Inbound InspectionC . Advanced URL Filtering (AURLF)D . WildFireView AnswerAnswer: B

April 2, 2025 No Comments READ MORE +

Which element protects and hides an internal network in an outbound flow ?

Which element protects and hides an internal network in an outbound flow ?A . DNS sinkholingB . User-IDC . App-IDD . NATView AnswerAnswer: D

March 29, 2025 No Comments READ MORE +

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)A . Intelligent Traffic OffloadB . Threat PreventionC . WildFireD . SD-WANView AnswerAnswer: BC

March 26, 2025 No Comments READ MORE +

What do tags allow a VM-Series firewall to do in a virtual environment?

What do tags allow a VM-Series firewall to do in a virtual environment?A . Enable machine learning (ML).B . Adapt Security policy rules dynamically.C . Integrate with security information and event management (SIEM) solutions.D . Provide adaptive reporting.View AnswerAnswer: B

March 21, 2025 No Comments READ MORE +

Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)

Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)A . Prism CentralB . BootstrapC . Service ClusterD . Host-basedView AnswerAnswer: CD

March 15, 2025 No Comments READ MORE +