Which two designs require virtual systems? (Choose two.)
Answer : B, C
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
Answer : A, C
What are three considerations when deploying User-ID. (Choose three.)
Answer : A, C, D
A customer is adopting Microsoft Office 365 but is concerned about the potential security exposure that such a move could mean. The security analyst suggests using Aperture and the Palo Alto Network firewall together to provide data and network security.
What are the two reasons this solution has been suggested? (Choose two.)
Answer : A, B
Which three policies or certificates must be configured for SSL Forward Proxy decryption? (Choose three.)
What are the three benefits of the Palo Alto Networks migration tool? (Choose three.)
Answer : A, B, C
What is the HA limitation specific to the PA-200 appliance?
Answer : B