Which subscription should be activated when a predefined, known malicious IP address is updated?
Which of the following statements applies to enabling App-ID on a Next-Generation Firewall (NGFW)?
To use App-ID effectively in Security policies, which three best practices should be followed? (Choose three.)
Select 3 Correct Responses
Which two Cloud-Delivered Security Services (CDSS) would be appropriate for an organization that wants to secure internet traffic on a perimeter firewall? (Choose two.)
Select 2 Correct Responses
Which architecture allows a Palo Alto Networks Next-Generation Firewall (NGFW) to achieve high performance with all security features enabled?
Which two of the following are ways that Palo Alto Networks CloudDelivered Security Services (CDSS) use confidential information collected from users? (Choose two.)
Select 2 Correct Responses