In which two applications can Prisma Access threat logs for mobile user traffic be reviewed? (Choose two.)
Which component of NGFW is supported in active/passive design but not in active/active design?
A network security engineer has created a Security policy in Prisma Access that includes a negated region in the source address. Which configuration will ensure there is no connectivity loss due to the negated region?
Which two security services are required for configuration of NGFW Security policies to protect against malicious and misconfigured domains? (Choose two.)
After a firewall is associated with Strata Cloud Manager (SCM), which two additional actions are required to enable management of the firewall from SCM? (Choose two.)
Which two SSH Proxy decryption profile settings should be configured to enhance the company’s security posture? (Choose two.)
What are two recommendations to ensure secure and efficient connectivity across multiple locations in a distributed enterprise network? (Choose two.)
During a security incident investigation, which Security profile will have logs of attempted confidential data exfiltration?
What key capability distinguishes Content-ID technology from conventional network security approaches?
How do Cloud NGFW instances get created when using AWS centralized deployments?
Which two content updates can be pushed to next-generation firewalls from Panorama? (Choose two.)
In a service provider environment, what key advantage does implementing virtual systems provide for managing multiple customer environments?
What occurs when a security profile group named “default” is created on an NGFW?
When a firewall acts as an application-level gateway (ALG), what does it require in order to establish a connection?