In a firewall, which three decryption methods are valid? (Choose three)
In a firewall, which three decryption methods are valid? (Choose three)
A . SSL Inbound Inspection
B . SSL Outbound Proxyless Inspection
C . SSL Inbound Proxy
D . Decryption Mirror
E . SSH Proxy
Answer: A,D,E
Explanation:
You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.
Ref: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-overview.html#idd71f8b4d-cd40-4c6c-905f-2f8c7fca6537
Latest PCNSE Dumps Valid Version with 280 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments