Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which three NSX features can be pushed from Panorama in PAN-OS? (Choose three.)

A.

Security group assignment of virtual machines (VMs)

B.

Security groups

C.

Steering rules

D.

User IP mappings

E.

Multiple authorization codes

Full Access
Question # 5

How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?

A.

It must be deployed as a member of a device cluster

B.

It must use a Layer 3 underlay network

C.

It must receive all forwarding lookups from the network controller

D.

It must be identified as a default gateway

Full Access
Question # 6

Which component scans for threats in allowed traffic?

A.

Intelligent Traffic Offload

B.

TLS decryption

C.

Security profiles

D.

NAT

Full Access
Question # 7

A CN-Series firewall can secure traffic between which elements?

A.

Host containers

B.

Source applications

C.

Containers

D.

IPods

Full Access
Question # 8

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewalls to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)

A.

Intelligent Traffic Offload

B.

Threat Prevention

C.

WildFire

D.

SD-WAN

Full Access
Question # 9

Which software firewall would assist a prospect who is interested in securing extensive DevOps deployments?

A.

CN-Series

B.

Ion-Series

C.

Cloud next-generation firewall

D.

VM-Series

Full Access
Question # 10

What must be enabled when using Terraform templates with a Cloud next-generation firewall (NGFW) for Amazon Web Services (AWS)?

A.

AWS CloudWatch logging

B.

Access to the Cloud NGFW for AWS console

C.

Access to the Palo Alto Networks Customer Support Portal

D.

AWS Firewall Manager console access

Full Access
Question # 11

Where do CN-Series devices obtain a VM-Series authorization key?

A.

Panorama

B.

Local installation

C.

GitHub

D.

Customer Support Portal

Full Access
Question # 12

What is a benefit of network runtime security?

A.

It more narrowly focuses on one security area and requires careful customization integration and maintenance

B.

It removes vulnerabilities that have been baked into containers.

C.

It is siloed to enhance workload security.

D.

It identifies unknown vulnerabilities that cannot be identified by known Common Vulnerability and Exposure (CVE) lists.

Full Access
Question # 13

How are Palo Alto Networks Next-Generation Firewalls (NGFWs) deployed within a Cisco ACI architecture?

A.

SDN code hooks can help detonate malicious file samples designed to detect virtual environments.

B.

Traffic can be automatically redirected using static address objects.

C.

Service graphs are configured to allow their deployment.

D.

VXLAN or NVGRE traffic is terminated and inspected for translation to VLANs.

Full Access
Question # 14

When implementing active-active high availability (HA), which feature must be configured to allow the HA pair to share a single IP address that may be used as the network's gateway IP address?

A.

ARP load sharing

B.

Floating IP address

C.

HSRP

D.

VRRP

Full Access
Question # 15

What is the structure of the YAML Ain't Markup Language (YAML) file repository?

A.

Deployment Type/Kubernetes/Environment

B.

Kubernetes/Deployment Type/Environment

C.

Kubernetes/Environment/Deplovment Type

D.

Environment/Kubernetes/Deployment Type

Full Access
Question # 16

Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?

A.

OCSP

B.

Secure Sockets Layer (SSL) Inbound Inspection

C.

Advanced URL Filtering (AURLF)

D.

WildFire

Full Access
Question # 17

What helps avoid split brain in active-passive high availability (HA) pair deployment?

A.

Using a standard traffic interface as the HA2 backup

B.

Enabling preemption on both firewalls in the HA pair

C.

Using the management interface as the HA1 backup link

D.

Using a standard traffic interface as the HA3 link

Full Access