Based on the image provided, which two statements apply to the Security policy rules? (Choose two.)
What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic
Which statement accurately describes how the firewall will apply an action to matching traffic?
What are the two main reasons a custom application is created? (Choose two.)