What are two valid zone types that can be selected from the zone configuration menu, per Palo Alto Networks best practices? (Choose two answers)
When integrating Kubernetes with Palo Alto Networks NGFWs, what is used to secure traffic between microservices?
How does a Palo Alto Networks firewall choose the best route when it receives routes for the same destination from different routing protocols?
An engineer is troubleshooting a failed inter-VSYS communication path between a DMZ-VSYS and an Internal-VSYS. The configuration includes separate virtual routers with next-vr static routes and appropriate Security policies within each VSYS allowing traffic to and from their external zones. Given that all routing and policy configurations within each individual VSYS are correct, what is the probable cause of the failure?
What is a valid configurable limit for setting resource quotas when defining a new VSYS on a Palo Alto Networks firewall?
How does a Palo Alto Networks NGFW respond when the preemptive hold time is set to 0 minutes during configuration of route monitoring?
Without performing a context switch, which set of operations can be performed that will affect the operation of a connected firewall on the Panorama GUI?
An organization runs multiple Kubernetes clusters both on-premises and in public clouds (AWS, Azure, GCP). They want to deploy the Palo Alto Networks CN-Series NGFW to secure east-west traffic within each cluster, maintain consistent Security policies across all environments, and dynamically scale as containerized workloads spin up or down. They also plan to use a centralized Panorama instance for policy management and visibility.
Which approach meets these requirements?
An engineer is configuring a site-to-site IPSec VPN to a partner network. The IKE Gateway and IPSec tunnel configurations are complete, and the tunnel interface has been assigned to a security zone. However, the tunnel fails to establish, and no application traffic passes through it once it is up. Which two Security policy configurations are required to allow tunnel establishment and data traffic flow in this scenario? (Choose two answers)
An administrator plans to upgrade a pair of active/passive firewalls to a new PAN-OS release. The environment is highly sensitive, and downtime must be minimized.
What is the recommended upgrade process for minimal disruption in this high availability (HA) scenario?