Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How does Prisma Cloud Compute offer workload security at runtime?

A.

It automatically builds an allow-list security model for every container and service.

B.

It quarantines containers that demonstrate increased CPU and memory usage.

C.

It automatically patches vulnerabilities and compliance issues for every container and service.

D.

It works with the identity provider (IdP; to identify overprivileged containers and services and it restricts network access

Regarding network segmentation, which two steps are involved in the configuration of a default route to an internet router? (Choose two.)

A.

Select the Static Routes tab, then click Add.

B.

Select Network > Interfaces.

C.

Select the Config tab. then select New Route from the Security Zone Route drop-down menu.

D.

Select Network > Virtual Router, then select the default link to open the Virtual Router dialog.

Which protocol is used for communicating between VM-Series firewalls and a gateway load balancer in Amazon Web Services (AWS)?

A.

VRLAN

B.

Geneve

C.

GRE

D.

VMLAN

Which two valid components are used in installation of a VM-Series firewall in an OpenStack environment? (Choose two.)

A.

OpenStack heat template in JSON format

B.

OpenStack heat template in YAML Ain't Markup Language (YAML) format

C.

VM-Series VHD image

D.

VM-Series qcow2 image

Which PAN-OS feature allows for automated updates to address objects when VM-Series firewalls are setup as part of an NSX deployment?

A.

Boundary automation

B.

Hypervisor integration

C.

Bootstrapping

D.

Dynamic Address Group

A CN-Series firewall can secure traffic between which elements?

A.

Host containers

B.

Source applications

C.

Containers

D.

IPods

Which component allows the flexibility to add network resources but does not require making changes to existing policies and rules?

A.

Content-ID

B.

External dynamic list

C.

App-ID

D.

Dynamic address group

What do tags allow a VM-Series firewall to do in a virtual environment?

A.

Enable machine learning (ML).

B.

Adapt Security policy rules dynamically.

C.

Integrate with security information and event management (SIEM) solutions.

D.

Provide adaptive reporting.

Which feature must be configured in an NSX environment to ensure proper operation of a VM-Series firewall in order to secure east-west traffic?

A.

Deployment of the NSX DFW

B.

VMware Information Sources

C.

User-ID agent on a Windows domain server

D.

Device groups within VMware Services Manager

Which two mechanisms could trigger a high availability (HA) failover event? (Choose two.)

A.

Heartbeat polling

B.

Ping monitoring

C.

Session polling

D.

Link monitoring