Question 6 of 172

Which of the following CANNOT use the source user as a match criterion?

Answer

Suggested Answer

The suggested answer is E.

Question 7 of 172

Which statement below is TRUE?

Answer

Suggested Answer

The suggested answer is D.

Question 8 of 172

When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in policies by specifying the SSHtunnel AppID?

Answer

Suggested Answer

The suggested answer is A.

Question 9 of 172

What are two sources of information for determining whether the firewall has been successful in communicating with an external UserID Agent?

Answer

Suggested Answer

The suggested answer is A.

Question 10 of 172

What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for the action setting?

Answer

Suggested Answer

The suggested answer is A.