Which element protects and hides an internal network in an outbound flow ?
Which element protects and hides an internal network in an outbound flow ?A . DNS sinkholingB . User-IDC . App-IDD . NATView AnswerAnswer: D
Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)
Which two subscriptions should be recommended to a customer who is deploying VM-Series firewall s to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)A . Intelligent Traffic OffloadB . Threat PreventionC . WildFireD . SD-WANView AnswerAnswer: BC
What do tags allow a VM-Series firewall to do in a virtual environment?
What do tags allow a VM-Series firewall to do in a virtual environment?A . Enable machine learning (ML).B . Adapt Security policy rules dynamically.C . Integrate with security information and event management (SIEM) solutions.D . Provide adaptive reporting.View AnswerAnswer: B
Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)
Which two deployment modes of VM-Series firewall s are supported across NSX-T? (Choose two.)A . Prism CentralB . BootstrapC . Service ClusterD . Host-basedView AnswerAnswer: CD
Which component allows the flexibility to add network resources but does not require making changes to existing policies and rules?
Which component allows the flexibility to add network resources but does not require making changes to existing policies and rules?A . Content-IDB . External dynamic list (EDL)C . App-IDD . Dynamic address groupView AnswerAnswer: D
Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)
Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)A . Compliance is validated.B . Boundaries are established.C . Security automation is seamlessly integrated.D . Access controls are enforced.View AnswerAnswer: BD
Which technology allows for granular control of east-west traffic in a software-defined network?
Which technology allows for granular control of east-west traffic in a software-defined network?A . RoutingB . MicrosegmentationC . MAC Access Control ListD . VirtualizationView AnswerAnswer: B
Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?
Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?A . Advanced URL Filtering (AURLF)B . Cortex Data LakeC . DNS SecurityD . Panorama VM-Series pluginView AnswerAnswer: A
Which software firewall would help a prospect interested in securing an environment with Kubernetes?
Which software firewall would help a prospect interested in securing an environment with Kubernetes?A . KN-SeriesB . ML-SeriesC . VM-SeriesD . CN-SeriesView AnswerAnswer: D
Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?
Which PAN-OS feature allows for automated updates to address objects when VM-Series firewall s are setup as part of an NSX deployment?A . Boundary automationB . Hypervisor integrationC . BootstrappingD . Dynamic Address GroupView AnswerAnswer: D