You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Web 2.0 applications provide which type of service?