Which task is required to create steering rules on NSX-V Manager?
A. Select Steering Rules > 3rd Party Firewalls > Palo Alto Networks and then populate the object with the required details
B. Configure the rule in Panorama and push it to NSX-V Manager.
C. Select Fabric > Access Policies > Quick Start and follow the prompts
D. Add a network introspective service and select Redirect to Service under Action.
Describe the Automated Deployment of the NSX VM-Series firewall for NSX Solution?
A. When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed, provisioned and available for immediate policy enforcement without any little manual intervention.
B. When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed, provisioned and available for immediate policy enforcement without any manual intervention.
C. When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed provisioned and after manually retrieving licenses available for immediate policy enforcement.
D. When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed and after manually adding licenses available for policy enforcement.
A customer wants to completely segment their internal networks They have Cisco switches and extensively use 10Gbps interfaces. They are running VMware ESXi and are considering implementing NSX.
Which three Palo Alto Networks firewall models will support this deployment? (Choose three)
A. PA-3050
B. VM-100
C. VM-300
D. PA-3250
E. PA-7050
Which protocol is used by VMware to encapsulate packets in NSX?
A. VRLAN
B. VXLAN
C. GRE
D. VMLAN
A company allows employees some personal use of the internet during work time However the CEO is concerned that employees are using too much of the bandwidth for YouTube. thus causing a performance problem. Which section of the SLR could confirm or allay this concern?
A. Categories with the Most Applications
B. Categories Consuming the Most Bandwidth
C. Bandwidth Consumed by Applications
D. High-Risk Applications
What is a company that is moving as much of its business as possible into Microsoft Azure trying to minimize?
A. capital expenses
B. operating expenses
C. security exposure
D. operating expenses and capital expenses
Is vulnerability analysis against images in the registry sufficient for security?
A. Yes, containers do not have unique vulnerabilities.
B. No, you should do vulnerability analysis only against the running containers, which are vulnerable.
C. Yes, you are ensuring that the images the containers are based on are secure.
D. No, you need to do analysis in the CI system, in the registry, and against instantiated containers
Whichconfiguration is required in NSX for Panorama to use the tags from security groups in dynamic address groups?
A. Create security groups only.
B. Create security groups and mark them as exchangeable.
C. Create security groups with tags marked as shareable.
D. Create security groups and use them in an NSX-to-Palo Alto Networks redirection policy.
What are three requirements to automate service deployment of a VM-Series firewall from an NSX Manager? (Choose three)
A. vCenter has been given Palo Alto Networks subscription licenses for VM-Series firewalls.
B. The deployed VM-Series firewall can establish communications with Panorama.
C. Panorama has been configured to recognize both the NSX Manager and vCenter.
D. Panorama can establish communications to the public Palo Alto Networks update servers.
E. The NSX Manager completed the host preparation prior to the VM-Series firewall service deployment.
What is the major decision factor that customers use when selecting a managed container platform such as AS/EKS/GKE?
A. licensing costs
B. enhanced capabilities not available in vanilla K8s
C. no need to manage containers, just the application code.
D. reduced operational costs and management overhead