Where do CN-Series devices obtain a VM-Series authorization key?
A. Panorama
B. Local installation
C. GitHub
D. Customer Support Portal
Why are VM-Series firewalls and hardware firewalls that are external to the Kubernetes cluster problematic for protecting containerized workloads?
A. They are located outside the cluster and have no visibility into application-level cluster traffic.
B. They do not scale independently of the Kubernetes cluster.
C. They are managed by another entity when located inside the cluster.
D. They function differently based on whether they are located inside or outside of the cluster.
How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?
A. It must be deployed as a member of a device cluster
B. It must use a Layer 3 underlay network
C. It must receive all forwarding lookups from the network controller
D. It must be identified as a default gateway
Which software firewall would help a prospect interested in securing an environment with Kubernetes?
A. KN-Series
B. ML-Series
C. VM-Series
D. CN-Series
How does a CN-Series firewall prevent exfiltration?
A. It employs custom-built signatures based on hash
B. It distributes incoming virtual private cloud (VPC) traffic across the pool of VM-Series firewalls.
C. It provides a license deactivation API key.
D. It inspects outbound traffic content and blocks suspicious activity.
Auto scaling templates for which type of firewall enable deployment of a single auto scaling group (ASG) of VM-Series firewalls to secure inbound traffic from the internet to Amazon Web Services (AWS) application workloads?
A. HA-Series
B. CN-Series
C. IPA-Series
D. VM-Series
Which two actions can be performed for VM-Series firewall licensing by an orchestration system? (Choose two.)
A. Creating a license
B. Renewing a license
C. Registering an authorization code
D. Downloading a content update
Which three NSX features can be pushed from Panorama in PAN-OS? (Choose three.)
A. Security group assignment of virtual machines (VMs)
B. Security groups
C. Steering rules
D. User IP mappings
E. Multiple authorization codes
Which two statements apply to the VM-Series plugin? (Choose two.)
A. It can manage capabilities common to both VM-Series firewalls and hardware firewalls.
B. It can be upgraded independently of PAN-OS.
C. It enables management of cloud-specific interactions between VM-Series firewalls and supported public cloud platforms.
D. It can manage Panorama plugins.
What do tags allow a VM-Series firewall to do in a virtual environment?
A. Enable machine learning (ML).
B. Adapt Security policy rules dynamically.
C. Integrate with security information and event management (SIEM) solutions.
D. Provide adaptive reporting.