Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
Which security profile on the NGFW includes signatures to protect you from brute force attacks?