Which two features can be enabled to support asymmetric routing with redundancy on a Palo
Alto networks next-generation firewall (NGFW)? (Choose two.)
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A)
B)
C)
D)
When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)