What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)