Which three features are used to prevent abuse of stolen credentials? (Choose three.)
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)