What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
Which three mechanisms are valid for enabling user mapping? (Choose three.)
Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?
What are three considerations when deploying User-ID? (Choose three.)
A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?
Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address
Which mechanism prevents this connection from succeeding?
Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)