Which offering can gain visibility and prevent an attack by a malicious actor attempting to exploit a known web server vulnerability using encrypted communication?
A. OCSP
B. Secure Sockets Layer (SSL) Inbound Inspection
C. Advanced URL Filtering (AURLF)
D. WildFire
Which two valid components are used in installation of a VM-Series firewall in an OpenStack environment? (Choose two.)
A. OpenStack heat template in JSON format
B. OpenStack heat template in YAML Ain't Markup Language (YAML) format
C. VM-Series VHD image
D. VM-Series qcow2 image
How is traffic directed to a Palo Alto Networks firewall integrated with Cisco ACI?
A. By using contracts between endpoint groups that send traffic to the firewall using a shared policy
B. Through a virtual machine (VM) monitor domain
C. Through a policy-based redirect
D. By creating an access policy
Which component scans for threats in allowed traffic?
A. Intelligent Traffic Offload
B. TLS decryption
C. Security profiles
D. NAT
How does a CN-Series firewall prevent exfiltration?
A. It employs custom-built signatures based on hash
B. It distributes incoming virtual private cloud (VPC) traffic across the pool of VM-Series firewalls.
C. It provides a license deactivation API key.
D. It inspects outbound traffic content and blocks suspicious activity.
Which two methods of Zero Trust implementation can benefit an organization? (Choose two.)
A. Compliance is validated.
B. Boundaries are established.
C. Security automation is seamlessly integrated.
D. Access controls are enforced.
Which three NSX features can be pushed from Panorama in PAN-OS? (Choose three.)
A. Security group assignment of virtual machines (VMs)
B. Security groups
C. Steering rules
D. User IP mappings
E. Multiple authorization codes
Which two deployment modes of VM-Series firewalls are supported across NSX-T? (Choose two.)
A. Prism Central
B. Bootstrap
C. Service Cluster
D. Host-based
What helps avoid split brain in active-passive high availability (HA) pair deployment?
A. Using a standard traffic interface as the HA2 backup
B. Enabling preemption on both firewalls in the HA pair
C. Using the management interface as the HA1 backup link
D. Using a standard traffic interface as the HA3 link
Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?
A. Advanced URL Filtering (AURLF)
B. Cortex Data Lake
C. DNS Security
D. Panorama VM-Series plugin