What are three considerations when deploying User-ID? (Choose three.)
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
Which two features are key in preventing unknown targeted attacks? (Choose two)