Exam PCNSE All QuestionsBrowse all questions from this exam
Question 209

Which three statements accurately describe Decryption Mirror? (Choose three.)

    Correct Answer: A, B, E

    Decryption Mirror involves decryption, storage, inspection, and use of SSL traffic, which is regulated in certain countries. It is advised to consult with corporate counsel before activating and using Decryption Mirror in a production environment to ensure compliance with legal requirements. Moreover, the use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information submitted via an encrypted channel, such as usernames, passwords, and credit card numbers.

Discussion
UFanatOptions: ABE

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/decryption-mirroring Keep in mind that - the decryption, storage, inspection, and/or use of SSL traffic is governed in certain countries and - user consent might be required in order to use the decryption mirror feature. - Additionally, use of this feature could enable malicious users with administrative access to the firewall to harvest usernames, passwords, social security numbers, credit card numbers, or other sensitive information submitted using an encrypted channel. - Palo Alto Networks recommends that you consult with your corporate counsel before activating and using this feature in a production environment.

AbuHussainOptions: ABE

It;s ABE

GivemeMoneyOptions: ABE

B is right, which means D is wrong. ABE is correct.

blank_lvOptions: ABD

It;s ABD

Mucho9999

Its definitely ABE. https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/decryption-concepts/decryption-mirroring.html

zicouilleOptions: ABE

It's ABE

drrealestOptions: ABE

"Keep in mind that the decryption, storage, inspection, and/or use of SSL traffic is governed in certain countries and user consent might be required in order to use the decryption mirror feature. Additionally, use of this feature could enable malicious users with administrative access to the firewall to harvest usernames, passwords, social security numbers, credit card numbers, or other sensitive information submitted using an encrypted channel. Palo Alto Networks recommends that you consult with your corporate counsel before activating and using this feature in a production environment."

betko

This question was on exam in June 24.