Question 6 of 172
Which of the following CANNOT use the source user as a match criterion?
    Correct Answer: E

Question 7 of 172
Which statement below is True?
    Correct Answer: D

Question 8 of 172
When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in policies by specifying the SSHtunnel AppID?
    Correct Answer: A

Question 9 of 172
What are two sources of information for determining whether the firewall has been successful in communicating with an external UserID Agent?
    Correct Answer: A

Question 10 of 172
What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for the action setting?
    Correct Answer: A