JN0-231 Exam QuestionsBrowse all questions from this exam

JN0-231 Exam - Question 5


Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)

Show Answer
Correct Answer: ABD

Unified threat management (UTM) systems inspect traffic from multiple protocols to provide comprehensive network security. HTTP is a common protocol that UTM solutions inspect to detect and prevent threats from web traffic such as malicious websites and malware downloads. SMTP is another critical protocol inspected by UTM systems since email traffic can carry threats like spam, malware attachments, and phishing attempts. FTP is also inspected by UTM solutions to monitor file transfers and prevent the spread of malware. SNMP and SSH are generally used for network management and secure remote access, respectively, and are not typically the primary focus of UTM inspection.

Discussion

13 comments
Sign in to comment
Bubu3kOptions: ABD
Nov 15, 2022

It's ABD

TotalstrangerOptions: ABD
Nov 2, 2022

https://www.inetzero.com/blog/unified-threat-management-deeper-dive-traffic-inspection/

ars92Options: ABD
Oct 9, 2023

Unified Threat Management (UTM) solutions typically inspect traffic from a variety of protocols to provide comprehensive security. While the specific protocols may vary based on the UTM solution and its capabilities, here are three common protocols that UTM systems often inspect: HTTP (Hypertext Transfer Protocol): UTM devices commonly inspect web traffic over HTTP to detect and prevent threats such as malicious websites, phishing attempts, and malware downloads. SMTP (Simple Mail Transfer Protocol): Email traffic is a significant vector for cyber threats. UTM solutions often inspect SMTP traffic to identify and block spam, malware attachments, and phishing emails. FTP (File Transfer Protocol): UTM devices may inspect FTP traffic to ensure that file transfers do not involve malicious content. This helps in preventing the spread of malware through file-sharing activities.

libm2Options: ABD
Jul 9, 2023

It's ABD

RbrahmiOptions: ABD
Mar 2, 2023

It's ABD

DulgoldurOptions: ABD
Jun 11, 2023

It's ABD

fosi130Options: ABD
Jul 30, 2023

ABD for me

enkarOptions: ABD
Aug 24, 2023

ABD, C is wrong

Engg_flintOptions: ABD
Nov 4, 2023

its ABD

juanjoleandro16Options: ABD
Dec 11, 2023

Correct answer: ABD

66dc178Options: ABD
Jan 28, 2024

Protocols like SNMP (Simple Network Management Protocol) and SSH (Secure Shell) are generally used for network management and secure remote access, respectively, and are not typically the focus of UTM inspection for threats in the same way as FTP, SMTP, and HTTP traffic.

AdzricizOptions: ABD
Feb 16, 2024

its ABD

longanghiOptions: ABD
Mar 8, 2024

A B D is correct