Question 26
Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server?
(Choose three.)
(Choose three.)
Question 27
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
Question 28
Which two components must be configured within User-ID on a new firewall that has been implemented?
(Choose two.)
(Choose two.)
Question 29
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
Question 30
Which two types of security chains are supported by the Decryption Broker? (Choose two.)