Question 6 of 172Which of the following CANNOT use the source user as a match criterion?
Correct Answer: E
Question 7 of 172Which statement below is True?
Correct Answer: D
Question 8 of 172When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in policies by specifying the SSHtunnel AppID?
Correct Answer: A
Question 9 of 172What are two sources of information for determining whether the firewall has been successful in communicating with an external UserID Agent?
Correct Answer: A
Question 10 of 172What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for the action setting?