Which step should a SecOps engineer implement in order to create a network exposure policy that identifies instances accessible from any untrusted internet sources?
In WAAS Access control file upload controls, which three file types are supported out of the box? (Choose three.)
How many CLI remediation commands can be added in a custom policy sequence?
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)