Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )

Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )A . TACACS B. SAML2 C. SAML10 D. Kerberos E. TACACS+View AnswerAnswer: A,B,D

January 31, 2023 No Comments READ MORE +

What do you configure if you want to set up a group of objects based on their ports alone?

What do you configure if you want to set up a group of objects based on their ports alone?A . Application groups B. Service groups C. Address groups D. Custom objectsView AnswerAnswer: B

January 31, 2023 No Comments READ MORE +

Which policy achieves the desired results?

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications. Which policy achieves the desired results? A) B) C) D) A . Option B. Option C. Option D. OptionView AnswerAnswer: C

January 31, 2023 No Comments READ MORE +

Given the detailed log information above, what was the result of the firewall traffic inspection?

Given the detailed log information above, what was the result of the firewall traffic inspection? A . It was blocked by the Vulnerability Protection profile action. B. It was blocked by the Anti-Virus Security profile action. C. It was blocked by the Anti-Spyware Profile action. D. It was blocked by...

January 31, 2023 No Comments READ MORE +

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . Exploitation B. Installation C. Reconnaissance D. Act on ObjectiveView AnswerAnswer: A

January 31, 2023 No Comments READ MORE +

How are Application Fillers or Application Groups used in firewall policy?

How are Application Fillers or Application Groups used in firewall policy?A . An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group B. An Application Filter is a dynamic way to group applications and can be configured as...

January 31, 2023 No Comments READ MORE +

Complete the statement. A security profile can block or allow traffic____________

Complete the statement. A security profile can block or allow traffic____________A . on unknown-tcp or unknown-udp traffic B. after it is matched by a security policy that allows traffic C. before it is matched by a security policy D. after it is matched by a security policy that allows or...

January 30, 2023 No Comments READ MORE +

Which interface does not require a MAC or IP address?

Which interface does not require a MAC or IP address?A . Virtual Wire B. Layer3 C. Layer2 D. LoopbackView AnswerAnswer: A

January 30, 2023 No Comments READ MORE +

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)A . facebook B. facebook-chat C. facebook-base D. facebook-emailView AnswerAnswer: B,C

January 30, 2023 No Comments READ MORE +

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server. Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?A . antivirus profile applied...

January 30, 2023 No Comments READ MORE +