What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two.)
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.What are two steps in this process? (Choose two.)
Which task would be included in the Best Practice Assessment (BPA) tool?
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?
What are two benefits of the sinkhole Internet Protocol (IP) address that DNS Security sends to the client in place of malicious IP addresses? (Choose two.)