automation of UI workflow without any code development and deployment of Prisma SD-WAN ION devices
B.
utilization of near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats
C.
identification of port-based rules so they can be converted to application-based rules without compromising application availability
D.
configuration of the authentication source once instead of for each authentication method used
Answer:
A
Question 9
Which component of the secure access service edge (SASE) solution provides complete session protection, regardless of whether a user is on or off the corporate network?