Question 26

Which two types of security chains are supported by the Decryption Broker? (Choose two.)
  • Question 27

    Which three new script types can be analyzed in WildFire? (Choose three.)
  • Question 28

    Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
  • Question 29

    Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)
  • Question 30

    What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)