Question 26
Which two types of security chains are supported by the Decryption Broker? (Choose two.)
Question 27
Which three new script types can be analyzed in WildFire? (Choose three.)
Question 28
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
Question 29
Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)
Question 30
What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)