Palo Alto Networks PCSFE - Palo Alto Networks Certified Software Firewall Engineer Exam
Page: 2  / 25
							Total 125 questions
						
								Question #6 (Topic: Exam A)
								
							
							
																Which feature provides real-time analysis using machine learning (ML) to defend against new and unknown threats?
								
																										
							
						
 A. Advanced URL Filtering (AURLF) 
 B. Cortex Data Lake 
 C. DNS Security 
 D. Panorama VM-Series plugin 
								
								
									Answer: C
								
								
								Question #7 (Topic: Exam A)
								
							
							
																Which of the following can provide application-level security for a web-server instance on Amazon Web Services (AWS)?
								
																										
							
						
 A. VM-Series firewalls 
 B. Hardware firewalls 
 C. Terraform templates 
 D. Security groups 
								
								
									Answer: A
								
								
								Question #8 (Topic: Exam A)
								
							
							
																Which two statements apply to the VM-Series plugin? (Choose two.)
								
																										
							
						
 A. It can manage capabilities common to both VM-Series firewalls and hardware firewalls. 
 B. It can be upgraded independently of PAN-OS. 
 C. It enables management of cloud-specific interactions between VM-Series firewalls and supported public cloud platforms. 
 D. It can manage Panorama plugins. 
								
								
									Answer: BC
								
								
								Question #9 (Topic: Exam A)
								
							
							
																What can software next-generation firewall (NGFW) credits be used to provision?
								
																										
							
						
 A. Remote browser isolation 
 B. Virtual Panorama appliances 
 C. Migrating NGFWs from hardware to VMs 
 D. Enablement of DNS security 
								
								
									Answer: C
								
								
								Question #10 (Topic: Exam A)
								
							
							
																How is traffic directed to a Palo Alto Networks firewall integrated with Cisco ACI?
								
																	
							
						
 A. By using contracts between endpoint groups that send traffic to the firewall using a shared policy 
 B. Through a virtual machine (VM) monitor domain 
 C. Through a policy-based redirect (PBR) 
 D. By creating an access policy 
								
								
									Answer: C
								
								 
							 
									