Pass the Paloalto Networks PSE-Software Firewall Professional PSE-SoftwareFirewall Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Auto scaling templates for which type of firewall enable deployment of a single auto scaling group (ASG) of VM-Series firewalls to secure inbound traffic from the internet to Amazon Web Services (AWS) application workloads?

Options:

A.

HA-Series


B.

VM-Series


C.

PA-Series


D.

CN-Series


Expert Solution
Questions # 12:

Which software firewall would help a prospect interested in securing an environment with Kubernetes?

Options:

A.

ML-Series


B.

CN-Series


C.

KN-Series


D.

VM-Series


Expert Solution
Questions # 13:

Which two features of CN-Series firewalls protect east-west traffic between pods in different trust zones? (Choose two.)

Options:

A.

Intrusion prevention system (IPS)


B.

Communication with Panorama


C.

External load balancer (ELB)


D.

Layer 7 visibility


Expert Solution
Questions # 14:

Which two mechanisms could trigger a high availability (HA) failover event? (Choose two.)

Options:

A.

Ping monitoring


B.

Link monitoring


C.

Session polling


D.

Heartbeat polling


Expert Solution
Questions # 15:

A customer in a VMware ESXi environment wants to add a VM-Series firewall and partition an existing group of virtual machines (VMs) in the same subnet into two groups. One group requires no additional security, but the second group requires substantially more security.

How can this partition be accomplished without editing the IP addresses or the default gateways of any of the guest VMs?

Options:

A.

Edit the IP address of all of the affected VMs.


B.

Create a new virtual switch and use the VM-Series firewall to separate virtual switches using virtual wire mode. Then move the guests that require more security into the new virtual switch.


C.

Send the VLAN out of the virtual environment into a hardware Palo Alto Networks firewall in Layer 3 mode. Use the same IP address as the old default gateway, then delete it.


D.

Create a Layer 3 interface in the same subnet as the VMs and then configure proxy Address Resolution Protocol (ARP).


Expert Solution
Questions # 16:

Which technology allows for granular control of east-west traffic in a software-defined network?

Options:

A.

Microsegmentation


B.

MAC Access Control List


C.

Routing


D.

Virtualization


Expert Solution
Questions # 17:

Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)

Options:

A.

Boundaries are established.


B.

Security automation is seamlessly integrated.


C.

Compliance is validated.


D.

Access controls are enforced.


Expert Solution
Questions # 18:

How must a Palo Alto Networks Next-Generation Firewall (NGFW) be configured in order to secure traffic in a Cisco ACI environment?

Options:

A.

It must be deployed as a member of a device cluster.


B.

It must be identified as a default gateway.


C.

It must receive all forwarding lookups from the network controller.


D.

It must use a Layer 3 underlay network.


Expert Solution
Questions # 19:

Which solution is best for securing an EKS environment?

Options:

A.

API orchestration


B.

CN-Series high availability (HA) pair


C.

PA-Series using load sharing


D.

VM-Series single host


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions