Which two subscriptions should be recommended to a customer who is deploying VM-Series firewalls to a private data center but is concerned about protecting data-center resources from malware and lateral movement? (Choose two.)
Correct Answer: B,C
Threat Prevention and WildFire are the two subscriptions that provide protection against malware and lateral movement in a private data center. Threat Prevention blocks known threats using antivirus, anti-spyware, and vulnerability protection. WildFire analyzes unknown files and links in a cloud-based sandbox and generates signatures for new threats. Intelligent Traffic Offload is a feature that reduces the load on the firewall by offloading traffic that does not need inspection. SD-WAN is a feature that optimizes the performance and availability of WAN connections. Reference: Palo Alto Networks Certified Software Firewall Engineer (PCSFE), [Threat Prevention Datasheet], [WildFire Datasheet], [Intelligent Traffic Offload], [SD-WAN]
Question 2
What is required to integrate a Palo Alto Networks VM-Series firewall with Azure Orchestration?
Correct Answer: D
To integrate a Palo Alto Networks VM-Series firewall with Azure Orchestration, you need an API Key. The API Key is used to authenticate and authorize requests from Azure Orchestration to the VM-Series firewall. The API Key is generated on the VM-Series firewall and copied to Azure Orchestration. Reference: [Azure Orchestration Integration with Palo Alto Networks VM-Series Firewalls]
Question 3
Which two valid components are used in installation of a VM-Series firewall in an OpenStack environment? (Choose two.)
Correct Answer: B,D
The two valid components that are used in installation of a VM-Series firewall in an OpenStack environment are: OpenStack heat template in YAML Ain't Markup Language (YAML) format VM-Series qcow2 image OpenStack is a cloud computing platform that provides infrastructure as a service (IaaS) for deploying and managing virtual machines (VMs) and other resources. OpenStack environment requires network security that can protect the traffic between VMs or other cloud services from cyberattacks and enforce granular security policies based on application, user, content, and threat information. VM-Series firewall is a virtualized version of the Palo Alto Networks next-generation firewall that can be deployed on various cloud or virtualization platforms, including OpenStack. OpenStack heat template in YAML format is a valid component that is used in installation of a VM-Series firewall in an OpenStack environment. OpenStack heat template is a file that defines the resources and configuration for deploying and managing a VM-Series firewall instance on OpenStack. YAML is a human-readable data serialization language that is commonly used for configuration files. YAML format is supported for OpenStack heat templates for VM-Series firewalls. VM-Series qcow2 image is a valid component that is used in installation of a VM-Series firewall in an OpenStack environment. VM-Series qcow2 image is a file that contains the software image of the VM-Series firewall for OpenStack. qcow2 is a disk image format that supports features such as compression, encryption, snapshots, and copy-on-write. qcow2 format is supported for VM-Series images for OpenStack. OpenStack heat template in JSON format and VM-Series VHD image are not valid components that are used in installation of a VM-Series firewall in an OpenStack environment, as those are not supported formats for OpenStack heat templates or VM-Series images. Reference: Palo Alto Networks Certified Software Firewall Engineer (PCSFE), [Deploy the VM-Series Firewall on OpenStack], [What is YAML?], [What is qcow2?]
Question 4
Which component scans for threats in allowed traffic?
Correct Answer: C
Security profiles are the components that scan for threats in allowed traffic. Security profiles are sets of rules or settings that define how the firewall will inspect and handle traffic based on various threat prevention technologies, such as antivirus, anti-spyware, vulnerability protection, URL filtering, file blocking, data filtering, and WildFire analysis. Security profiles can be applied to Security policy rules to enforce granular protection against known and unknown threats in allowed traffic. Intelligent Traffic Offload, TLS decryption, and NAT are not components that scan for threats in allowed traffic, but they are related features that can enhance security and performance. Reference: Palo Alto Networks Certified Software Firewall Engineer (PCSFE), [Security Profiles Overview], [Threat Prevention Datasheet]
Question 5
What is the structure of the YAML Ain't Markup Language (YAML) file repository?
Correct Answer: B
Kubernetes/Deployment Type/Environment is the structure of the YAML Ain't Markup Language (YAML) file repository. YAML is a human-readable data serialization language that is commonly used for configuration files. YAML file repository is a collection of YAML files that specify the resources and configuration for deploying and managing infrastructure components, such as firewalls, load balancers, networks, or servers. Kubernetes/Deployment Type/Environment is the structure of the YAML file repository that organizes the YAML files based on the following criteria: Kubernetes: The platform that provides orchestration, automation, and management of containerized applications. Deployment Type: The method or model of deploying and managing infrastructure components, such as Terraform, Ansible, Helm, or Kubernetes manifests. Environment: The type or stage of the cloud or virtualization environment, such as development, testing, staging, or production. Deployment Type/Kubernetes/Environment, Kubernetes/Environment/Deployment Type, and Environment/Kubernetes/Deployment Type are not the structure of the YAML file repository, but they are related ways of organizing YAML files based on different criteria. Reference: [Palo Alto Networks Certified Software Firewall Engineer (PCSFE)], [What is YAML?], [YAML File Repository]