Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How is traffic directed to a Palo Alto Networks firewall integrated with Cisco ACI?

A.

by creating an access policy

B.

through a policy-based redirect (PBR)

C.

contracts between EPGs that send traffic to the firewall using a shared policy

D.

through a virtual machine monitor (VMM) domain

Describe the Automated Deployment of the NSX VM-Series firewall for NSX Solution'?

A.

When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed, provisioned and available for immediate policy enforcement without any little manual intervention

B.

When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed, provisioned and available for immediate policy enforcement without any manual intervention

C.

When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed provisioned and after manually retrieving licenses available for immediate policy enforcement.

D.

When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed and after manually adding licenses available for policy enforcement

Which two OpenStack components areused in the creation of a VM-Series firewall from a heat template in OpenStack? (Choose two )

A.

Swift creates the storage resources.

B.

Nova creates the firewall instance.

C.

Horizon

D.

Neutron creates the network resources.

Which interface mode does an administrator use to generate the statdump file that can be converted into an SLR? Assume that the administrator wants to make the evaluation as unintrusive as possible

A.

Virtual Wire

B.

TAP

C.

Layer 2

D.

Layer 3

What is the major decision factor that customers use when selecting a managed container platform such as AS/EKS/GKE?

A.

licensing costs

B.

enhanced capabilities not available in vanilla K8s

C.

no need to manage containers, just the application code.

D.

reduced operational costs and management overhead

Which three software components have integration for deploying a VM-Series firewall in OpenStack? (Choose three)

A.

Mirantis OpenStack distribution

B.

Nuage VSP SDN controller

C.

VMWare NSX for OpenStack

D.

Cisco ACI

E.

Contrail SDN controller

Which protocol is used by VMware to encapsulate packets in NSX?

A.

VRLAN

B.

VXLAN

C.

GRE

D.

VMLAN

Which three advantages of the Palo Alto Networks platform architecture are used to enable security orchestration in SDN? (Choose three )

A.

a full set of APIs enabling programmatic control of policy and configuration

B.

NVGRE support for advanced VLAN integration

C.

integration with leading orchestration platforms: VMware NSX. OpenStack. and Cisco ACI

D.

Dynamic Address Groups to adapt Security policies dynamically

E.

VXLAN support for network-layer abstraction

What are two ways to size a VM-Series firewall deployment to secure a VMware ESXi environment? (Choose two )

A.

one per virtual network

B.

one per vCenter server

C.

one per SaaS application in use

D.

one per ESXi host

What are two types of security that can be implemented across every phase of the Build, Ship, and Run lifecycle of a workload? (Choose two )

A.

Runtime Security

B.

Firewalling

C.

Vulnerability Management

D.

Compliance or Configuration Management