An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
Which Security profile should be used?
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
Which Security profile should be used?
Vulnerability Protection profiles are designed to defend against threats entering the network through methods such as buffer overflows and illegal code execution. These types of attacks aim to exploit system vulnerabilities, and a Vulnerability Protection profile is specifically formulated to detect and block these exploits.
Vulnerability Protection profiles protect against threats entering the network. For example, Vulnerability Protection profiles help protect against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities.
https://docs.paloaltonetworks.com/network-security/security-policy/security-profiles/security-profile-vulnerability-protection
Inbound threats, then the correct answer is A
A. Vulnerability protection Vulnerability Protection profiles help protect against threats entering the network, such as buffer overflows and illegal code execution
A. Vulnerability protection Vulnerability Protection profiles help protect against threats entering the network, such as buffer overflows and illegal code execution
A is correct
Correct
Same opinion as others.