Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two actions can be performed for VM-Series firewall licensing by an orchestration system? (Choose two.)

A.

Registering an authorization code

B.

Creating a license

C.

Downloading a content update

D.

Renewing a license

Full Access
Question # 5

How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?

A.

It must be deployed as a member of a device cluster.

B.

It must be identified as a default gateway.

C.

It must receive all forwarding lookups from the network controller.

D.

It must use a Layer 3 underlay network.

Full Access
Question # 6

Which solution is best for securing an EKS environment?

A.

API orchestration

B.

CN-Series high availability (HA) pair

C.

PA-Series using load sharing

D.

VM-Series single host

Full Access
Question # 7

Which of the following can provide application-level security for a web-server instance on Amazon Web Services (AWS)?

A.

VM-Series firewalls

B.

Hardware firewalls

C.

Terraform templates

D.

Security groups

Full Access
Question # 8

A CN-Series firewall can secure traffic between which elements?

A.

Host containers

B.

Containers

C.

Pods

D.

Source applications

Full Access
Question # 9

Which software firewall would assist a prospect who is interested in securing extensive DevOps deployments?

A.

VM-Series

B.

CN-Series

C.

Ion-Series

D.

Cloud next-generation firewall (NGFW)

Full Access
Question # 10

Which two configuration options does Palo Alto Networks recommend for outbound high availability (HA) design in Amazon Web Services using a VM-Series firewall? (Choose two.)

A.

Traditional active-active HA

B.

Transit gateway and Security VPC

C.

Traditional active-passive HA

D.

Transit VPC and Security VPC

Full Access
Question # 11

What can be implemented in a CN-Series to protect communications between Dockers?

A.

Data loss prevention (DLP)

B.

Firewalling

C.

Runtime security

D.

Vulnerability management

Full Access
Question # 12

Which two elements of the Palo Alto Networks platform architecture enable security orchestration in a software-defined network (SDN)? (Choose two.)

A.

NVGRE support for advanced VLAN integration

B.

Full set of APIs enabling programmatic control of policy and configuration

C.

VXLAN support for network-layer abstraction

D.

Dynamic Address Groups to adapt Security policies dynamically

Full Access
Question # 13

Which component scans for threats in allowed traffic?

A.

Security profiles

B.

NAT

C.

Intelligent Traffic Offload

D.

TLS decryption

Full Access
Question # 14

Where do CN-Series devices obtain a VM-Series authorization key?

A.

Panorama

B.

Local installation

C.

GitHub

D.

Customer Support Portal

Full Access
Question # 15

Which protocol is used for communicating between VM-Series firewalls and a gateway load balancer in Amazon Web Services (AWS)?

A.

Geneve

B.

VRLAN

C.

VMLAN

D.

GRE

Full Access
Question # 16

Which two subscriptions should be recommended to a customer who is deploying VM-Series firewalls to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)

A.

Threat Prevention

B.

SD-WAN

C.

Intelligent Traffic Offload

D.

WildFire

Full Access
Question # 17

Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)

A.

Boundaries are established.

B.

Security automation is seamlessly integrated.

C.

Compliance is validated.

D.

Access controls are enforced.

Full Access
Question # 18

With which two private cloud environments does Palo Alto Networks have deep integrations? (Choose two.)

A.

Cisco ACI

B.

VMware NSX-T

C.

Nutanix

D.

Dell APEX

Full Access
Question # 19

Which two mechanisms could trigger a high availability (HA) failover event? (Choose two.)

A.

Ping monitoring

B.

Link monitoring

C.

Session polling

D.

Heartbeat polling

Full Access