How does SSL Forward Proxy decryption work?
Answer : A
What are three considerations when deploying User-ID. (Choose three.)
Answer : A, C, D
Where are three tuning considerations when building a security policy to protect against modern day attacks? (Choose three)
Answer : B, C, E
Which two designs require virtual systems? (Choose two.)
Answer : B, C
The botnet report displays a confidence score of 1 to 5 indicating the likelihood of a botnet infection.
Which three sources are used by the firewall as the basis of this score? (Choose three.)
Answer : B, D, E
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/monitoring/generate-botnet-reports
What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)
Answer : A, B, C
Which certificate can be used to ensure that traffic coming from a specific server remains encrypted?
Answer : B
https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/device/device-certificate-management-ssl-decryption-exclusion