Describe the cyber-attack lifecycle and recognize common forms of attack. Describe PAN-OS threat prevention capabilities. Use firewall logs and reports to make better configuration decisions. Configure the firewall to detect, block, and record threats