An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted Information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MF
A. What should the enterprise do to use PAN-OS MFA?
A. onfigure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile
B. onfigure a Captive Portal authentication policy that uses an authentication sequence
C. se a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns
D. reate an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy