An administrator creates an application-based security policy rule and commits the change to the firewall.
Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)
An administrator creates an application-based security policy rule and commits the change to the firewall.
Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)
To identify the dependent applications for an application-based security policy rule, you should review the App Dependency application list from the Commit Status view, as it provides a summary of applications and their dependencies. Additionally, you can open the security policy rule and review the Depends On application list, which directly shows the applications that the specified rule depends on. These two methods ensure that all necessary dependencies are accurately identified and handled.
A&B https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies
AB looks correct
should be AB
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies
A and B are correct
A & B are correct
A and B look correct to me.
Updated URL: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies
A,B https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies