Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are three requirements to automate service deployment of a VM-Series firewall from an NSX Manager? (Choose three.)

A.

vCenter has been given Palo Alto Networks subscription licenses for VM-Series firewalls

B.

The deployed VM-Series firewall can establish communications with Panorama.

C.

Panorama has been configured to recognize both the NSX Manager and vCenter.

D.

Panorama can establish communications to the public Palo Alto Networks update servers.

E.

The NSX Manager completed the host preparation prior to the VM-Series firewall service deployment

In which two ways can micro-segmentation save money for the enterprise? (Choose two.)

A.

fewer capital expenses because fewer physical servers need to be bought

B.

fewer operating expenses because a smaller data center is operated

C.

fewer operating expenses because less public cloud capacity needs to be rented

D.

fewer capital expenses because the same number of physical servers can be kept in a smaller space

Which two options describe use cases of internal and external tags in Panorama? (Choose two.)

A.

device group membership

B.

template membership

C.

Dynamic Address Group membership

D.

rule grouping

In a VMware deployment, in order for the customer to get maximum performance out of a VM-700 firewall in PAN-OS 8 x how many virtual CPU cores can be used?

A.

8

B.

3

C.

32

D.

16

Which are two use cases for HSCI ports on the SMC module on PA-7000 Series? (Choose two )

A.

HA1 backup link in active/active HA

B.

HA1 link in active/passive HA

C.

HA3 link in active/active HA

D.

HA2 link in active/passive HA

In the following scenario, Route-based firewall redundancy is deployed in a Data Center, which statement is true?

A.

IP addresses of Firewall interfaces will move between devices when a firewall fails

B.

The 2 firewalls are in Active-Standby HA status

C.

Firewalls use dynamic routing protocols to determine the best path

D.

Floating IP addresses are necessary for HA configuration

Why are containers uniquely suitable for whitelist-based runtime security?

A.

Developers typically define the processes used in their containers within the Dockerfile

B.

Docker has a built-in runtime analysis capability to aid in whitelisting.

C.

Containers typically have only a few defined processes that should ever be executed.

D.

Operations teams typically know what processes are used within a container

When deploying VM series on NSX platform to support micro-segmentation, which statement is NOT correct?

A.

VM-Series uses NetX API to receive and send packets

B.

Traffic steering rules could be defined on Panorama and pushed to NSX Manager

C.

VM-Series provide Multi-tenancy support with multiple zones

D.

One panorama could support to connect with only one NSX manager