During a security incident investigation, which Security profile will have logs of attempted confidential data exfiltration?
Correct Answer:
B
A network security engineer needs to implement segmentation but is under strict compliance requirements to place security enforcement as close as possible to the private applications hosted in Azure. Which deployment style is valid and meets the requirements in this scenario?
Correct Answer:
C
Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)
Correct Answer:
BC
What must be configured to successfully onboard a Prisma Access remote network using Strata Cloud Manager (SCM)?
Correct Answer:
D
Which action allows an engineer to collectively update VM-Series firewalls with Strata Cloud Manager (SCM)?
Correct Answer:
C
