Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)
Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)
Unified threat management (UTM) systems inspect traffic from multiple protocols to provide comprehensive network security. HTTP is a common protocol that UTM solutions inspect to detect and prevent threats from web traffic such as malicious websites and malware downloads. SMTP is another critical protocol inspected by UTM systems since email traffic can carry threats like spam, malware attachments, and phishing attempts. FTP is also inspected by UTM solutions to monitor file transfers and prevent the spread of malware. SNMP and SSH are generally used for network management and secure remote access, respectively, and are not typically the primary focus of UTM inspection.
It's ABD
https://www.inetzero.com/blog/unified-threat-management-deeper-dive-traffic-inspection/
Unified Threat Management (UTM) solutions typically inspect traffic from a variety of protocols to provide comprehensive security. While the specific protocols may vary based on the UTM solution and its capabilities, here are three common protocols that UTM systems often inspect: HTTP (Hypertext Transfer Protocol): UTM devices commonly inspect web traffic over HTTP to detect and prevent threats such as malicious websites, phishing attempts, and malware downloads. SMTP (Simple Mail Transfer Protocol): Email traffic is a significant vector for cyber threats. UTM solutions often inspect SMTP traffic to identify and block spam, malware attachments, and phishing emails. FTP (File Transfer Protocol): UTM devices may inspect FTP traffic to ensure that file transfers do not involve malicious content. This helps in preventing the spread of malware through file-sharing activities.
It's ABD
It's ABD
It's ABD
ABD for me
ABD, C is wrong
its ABD
Correct answer: ABD
Protocols like SNMP (Simple Network Management Protocol) and SSH (Secure Shell) are generally used for network management and secure remote access, respectively, and are not typically the focus of UTM inspection for threats in the same way as FTP, SMTP, and HTTP traffic.
its ABD
A B D is correct