Which element protects and hides an internal network in an outbound flow ?

Which element protects and hides an internal network in an outbound flow ?A . DNS sinkholingB . User-IDC . App-IDD . NATView AnswerAnswer: D

March 29, 2025 No Comments READ MORE +

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)A . Intelligent Traffic OffloadB . Threat PreventionC . WildFireD . SD-WANView AnswerAnswer: BC

March 26, 2025 No Comments READ MORE +

What do tags allow a VM-Series firewall to do in a virtual environment?

What do tags allow a VM-Series firewall to do in a virtual environment?A . Enable machine learning (ML).B . Adapt Security policy rules dynamically.C . Integrate with security information and event management (SIEM) solutions.D . Provide adaptive reporting.View AnswerAnswer: B

March 21, 2025 No Comments READ MORE +

Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)

Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)A . Prism CentralB . BootstrapC . Service ClusterD . Host-basedView AnswerAnswer: CD

March 15, 2025 No Comments READ MORE +

Which component allows the flexibility to add network resources but does not require making changes to existing policies and rules?

Which component allows the flexibility to add network resources but does not require making changes to existing policies and rules?A . Content-IDB . External dynamic list (EDL)C . App-IDD . Dynamic address groupView AnswerAnswer: D

March 14, 2025 No Comments READ MORE +

Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)

Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)A . Compliance is validated.B . Boundaries are established.C . Security automation is seamlessly integrated.D . Access controls are enforced.View AnswerAnswer: BD

March 12, 2025 No Comments READ MORE +

Which technology allows for granular control of east-west traffic in a software-defined network?

Which technology allows for granular control of east-west traffic in a software-defined network?A . RoutingB . MicrosegmentationC . MAC Access Control ListD . VirtualizationView AnswerAnswer: B

March 3, 2025 No Comments READ MORE +

Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?

Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?A . Advanced URL Filtering (AURLF)B . Cortex Data LakeC . DNS SecurityD . Panorama VM-Series pluginView AnswerAnswer: A

March 2, 2025 No Comments READ MORE +

Which software firewall would help a prospect interested in securing an environment with Kubernetes?

Which software firewall would help a prospect interested in securing an environment with Kubernetes?A . KN-SeriesB . ML-SeriesC . VM-SeriesD . CN-SeriesView AnswerAnswer: D

February 27, 2025 No Comments READ MORE +

Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?

Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?A . Boundary automationB . Hypervisor integrationC . BootstrappingD . Dynamic Address GroupView AnswerAnswer: D

February 25, 2025 No Comments READ MORE +