Describe the Automated Deployment of the NSX VM-Series firewall for NSX Solution'?
A.
When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed,
provisioned and available for immediate policy enforcement without any little manual intervention
B.
When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed,
provisioned and available for immediate policy enforcement without any manual intervention
C.
When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed
provisioned and after manually retrieving licenses available for immediate policy enforcement.
D.
When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed and
after manually adding licenses available for policy enforcement
When a new ESXi host is added to a cluster, a new VM-Series firewall is automatically deployed,
provisioned and available for immediate policy enforcement without any manual intervention
Is vulnerability analysis against images in the registry sufficient for security?
A.
Yes, containers do not have unique vulnerabilities.
B.
No, you should do vulnerability analysis only against the running containers, which are vulnerable.
C.
Yes, you are ensuring that the images the containers are based on are secure.
D.
No, you need to do analysis in the CI system, in the registry, and against instantiated containers
Yes, you are ensuring that the images the containers are based on are secure.
When deploying VM series on Openstack platform, which statement is correct?
A.
Allow configuration of at least one interface
B.
OpenStack compute node could be installed on a hypervisor platform
C.
Accept the VM-Series OVA image
D.
Set Instance type OS::Nova Server
OpenStack compute node could be installed on a hypervisor platform
Which capacity license does an administrator get with a pay-as-you-go license on Public Cloud market places?
A.
VM-100
B.
VM-1000
C.
VM-300
D.
VM-200
VM-100
How do Palo Alto Networks NGFWs integrate with an ACI architecture?
A.
SDN code hooks can help to detonate malicious file samples designed to detect virtual environments
B.
Traffic can be automatically redirected using static Address objects.
C.
VXLAN or NVGRE traffic is terminated and inspected for translation to VLANs.
D.
Controllers can program firewalls using a REST-based API.
Traffic can be automatically redirected using static Address objects.
Page 2 out of 12 Pages |
Previous |