Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)

A.

Choose "Fixed vCPU Models" for configuration type.

B.

Allocate the same number of vCPUs as the perpetual VM.

C.

Deploy virtual Panorama for management.

D.

Allow only the same security services as the perpetual VM.

A network administrator is using DNAT to map two servers to one public IP address. Traffic will be directed to a specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two sets of Security policy rules will accomplish this configuration? (Choose two.)

A.

Source: Untrust (Any) Destination: Untrust Application(s): web-browsing Action: allow

B.

Source: Untrust (Any) Destination: Trust Application(s): web-browsing, ssh Action: allow

C.

Source: Untrust (Any) Destination: DMZ Application(s): web-browsing Action: allow

D.

Source: Untrust (Any) Destination: DMZ Application(s): ssh Action: allow

Which statement best demonstrates a fundamental difference between Content-ID and traditional network security methods?

A.

Content-ID inspects traffic at the application layer to provide real-time threat protection.

B.

Content-ID focuses on blocking malicious IP addresses and ports.

C.

Traditional methods provide comprehensiveapplication layer inspection.

D.

Traditional methods block specific applications using signatures.

Which feature is available in both Panorama and Strata Cloud Manager (SCM)?

A.

Template stacks

B.

Configuration snippets

C.

Policy Optimizer

D.

Plug-ins

Which two content updates can be pushed to next-generation firewalls from Panorama? (Choose two.)

A.

GlobalProtect data file

B.

WildFire

C.

Advanced URL Filtering

D.

Applications and threats

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?

A.

It provides perimeter threat detection and inspection outside the container itself.

B.

It prevents lateral threat movement within the container itself.

C.

It monitors and logs traffic outside the container itself.

D.

It enables core zone segmentation within the container itself.

A firewall administrator wants to segment the network traffic and prevent noncritical assets from being able to access critical assets on the network.

Which action should the administrator take to ensure the critical assets are in a separate zone from the noncritical assets?

A.

Create a deny Security policy with "any" set for both thesource and destination zones.

B.

Create an allow Security policy with "any" set for both thesource and destination zones.

C.

Logically separate physical and virtual interfaces to control the traffic that passes across the interface.

D.

Assign a single interface to multiple security zones.

Which Cloud-Delivered Security Services (CDSS) solution is required to configure and enable Advanced DNS Security?

A.

Advanced WildFire

B.

Enterprise SaaS Security

C.

Advanced Threat Prevention

D.

Advanced URL Filtering

Which two SSH Proxy decryption profile configurations will reduce network attack surface? (Choose two.)

A.

Allow sessions if resources not available.

B.

Allow sessions with unsupported versions.

C.

Block sessions on certificate errors.

D.

Block sessions with unsupported versions.

A network security engineer wants to forward Strata Logging Service data to tools used by the Security Operations Center (SOC) for further investigation.

In which best practice step of Palo Alto Networks Zero Trust does this fit?

A.

Implementation

B.

Report and Maintenance

C.

Map and Verify Transactions

D.

Standards and Designs