Which two steps are required to configure the Decryption Broker? (Choose two.)
A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.
Which version of WildFire will meet this customer’s requirements?
Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)