Question 6

Which two types of security chains are supported by the Decryption Broker? (Choose two.)
  • Question 7

    Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
  • Question 8

    Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls?
    (Choose three.)
  • Question 9

    Which two steps are required to configure the Decryption Broker? (Choose two.)
  • Question 10

    How do you configure the rate of file submissions to WildFire in the NGFW?