Question 26

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server?
(Choose three.)
  • Question 27

    When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
  • Question 28

    Which two components must be configured within User-ID on a new firewall that has been implemented?
    (Choose two.)
  • Question 29

    Which security profile on the NGFW includes signatures to protect you from brute force attacks?
  • Question 30

    Which two types of security chains are supported by the Decryption Broker? (Choose two.)