Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-SWFW-Pro-24 Topic 6 Question 15 Discussion

Actual exam question for Palo Alto Networks's PSE-SWFW-Pro-24 exam
Question #: 15
Topic #: 6
[All PSE-SWFW-Pro-24 Questions]

A customer with multiple virtual private clouds (VPCs) in Amazon Web Services (AWS) protected by the cloud-native firewall experiences a cloud breach. As a result, malware spreads quickly across the VPCs, infecting several workloads.

Which minimum solution should be proposed to prevent similar incidents in the future?

Show Suggested Answer Hide Answer
Suggested Answer: D

Comprehensive and Detailed In-Depth Step-by-Step Explanation:

The customer's AWS environment, with multiple VPCs protected by a cloud-native firewall, experienced a breach due to malware spreading across VPCs, indicating inadequate segmentation and visibility. The Palo Alto Networks Systems Engineer Professional - Software Firewall documentation provides guidance on securing multi-VPC AWS environments with Cloud NGFW, focusing on preventing lateral movement and enhancing threat prevention.

Implement a Cloud NGFW for each VPC (Option D): Deploying a Cloud NGFW instance in each VPC ensures localized traffic inspection, segmentation, and control, preventing malware from spreading laterally across VPCs. Cloud NGFW for AWS supports a distributed deployment model, allowing each VPC to have its own firewall instance integrated with AWS services (e.g., VPC routing, Security Groups) to enforce policies, block threats, and maintain visibility. The documentation recommends this approach for multi-VPC environments to minimize risk exposure and ensure granular security, addressing the customer's breach scenario by isolating and securing each VPC independently.

Options A (Purchase a software credit pool for flexible Cloud NGFW deployment across the VPCs), B (Deploy a single Cloud NGFW), and C (Subscribe to Palo Alto Networks Advanced Threat Protection for the cloud-native firewall) are incorrect. A software credit pool (Option A) is a licensing mechanism, not a deployment solution, and does not address the need for multiple VPC protection. A single Cloud NGFW (Option B) cannot effectively secure multiple VPCs without introducing latency or complexity (e.g., centralized routing), failing to prevent lateral movement as seen in the breach. Advanced Threat Protection (Option C) enhances threat detection but does not resolve the segmentation issue; it requires a distributed deployment (like Option D) to prevent malware spread across VPCs.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel