Exam PCNSE All QuestionsBrowse all questions from this exam
Question 220

In a firewall, which three decryption methods are valid? (Choose three.)

    Correct Answer: B, C, E

    The three valid decryption methods in a firewall are SSL Inbound Inspection, SSH Proxy, and Decryption Mirror. SSL Inbound Inspection is used to monitor incoming encrypted traffic, SSH Proxy decrypts and inspects SSH traffic, and Decryption Mirror forwards decrypted traffic as plaintext for additional analysis. SSL Outbound Proxyless Inspection is not a standard decryption method provided by firewalls, and SSL Inbound Proxy is essentially the same as SSL Inbound Inspection.

Discussion
MarcyyOptions: BCE

BCE is correct.

TAKUM1yOptions: BCE

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-overview

K5000ismOptions: BCE

SSL Forward Proxy SSL Inbound Inspection. SSH Proxy You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving. Ref: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-overview.html#idd71f8b4d-cd40-4c6c-905f-2f8c7fca6537

DenskyDenOptions: BCE

BCE. The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.

UFanatOptions: BCE

BCE correct

123XYZTOptions: BCE

BCE The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.

Chiquitabandita

this answer conflicts with 189 on this list, decryption mirroring is counted as a rule profile or not? You can also use a Decryption policy rule to define Decryption Mirroring. On this question it is an answer and on 189 is not.

Sammy3637Options: BCE

Nothing exist as A&B , leaves us with options BCE