WildFire subscription supports analysis of which three types? (Choose three.)
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?
Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)
Which two types of security chains are supported by the Decryption Broker? (Choose two.)
A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)
What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)