Question 51
What can be applied to prevent users from unknowingly downloading malicious file types from the internet?
Question 52
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.
Which two features must be enabled to meet the customer's requirements? (Choose two.)
Which two features must be enabled to meet the customer's requirements? (Choose two.)
Question 53
Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?
Question 54
A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?
How is this goal accomplished?