Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
The four actions that can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts are Reset, Quarantine, Drop, and Alert. Reset is used to terminate the connection, Quarantine isolates the threat, Drop discards the traffic, and Alert generates a log entry for analysis. 'Allow' and 'Redirect' are not typical actions to handle such traffic because they would not mitigate the threat; 'Allow' would permit the traffic, and 'Redirect' is generally used for other security purposes like URL filtering.
Correct
ACDF is true - https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware
ACDF are correct
CORRECT