In a firewall, which three decryption methods are valid? (Choose three.)
In a firewall, which three decryption methods are valid? (Choose three.)
The three valid decryption methods in a firewall are SSL Inbound Inspection, SSH Proxy, and Decryption Mirror. SSL Inbound Inspection is used to monitor incoming encrypted traffic, SSH Proxy decrypts and inspects SSH traffic, and Decryption Mirror forwards decrypted traffic as plaintext for additional analysis. SSL Outbound Proxyless Inspection is not a standard decryption method provided by firewalls, and SSL Inbound Proxy is essentially the same as SSL Inbound Inspection.
BCE is correct.
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-overview
SSL Forward Proxy SSL Inbound Inspection. SSH Proxy You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving. Ref: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-overview.html#idd71f8b4d-cd40-4c6c-905f-2f8c7fca6537
BCE. The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.
BCE correct
BCE The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.
this answer conflicts with 189 on this list, decryption mirroring is counted as a rule profile or not? You can also use a Decryption policy rule to define Decryption Mirroring. On this question it is an answer and on 189 is not.
Nothing exist as A&B , leaves us with options BCE