Which three platform components can identify and protect against malicious email links? (Choose three.)
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
What are three considerations when deploying User-ID? (Choose three.)
Which statement is true about Deviating Devices and metrics?