Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )A . TACACS B. SAML2 C. SAML10 D. Kerberos E. TACACS+View AnswerAnswer: A,B,D
What do you configure if you want to set up a group of objects based on their ports alone?
What do you configure if you want to set up a group of objects based on their ports alone?A . Application groups B. Service groups C. Address groups D. Custom objectsView AnswerAnswer: B
Which policy achieves the desired results?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications. Which policy achieves the desired results? A) B) C) D) A . Option B. Option C. Option D. OptionView AnswerAnswer: C
Given the detailed log information above, what was the result of the firewall traffic inspection?
Given the detailed log information above, what was the result of the firewall traffic inspection? A . It was blocked by the Vulnerability Protection profile action. B. It was blocked by the Anti-Virus Security profile action. C. It was blocked by the Anti-Spyware Profile action. D. It was blocked by...
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . Exploitation B. Installation C. Reconnaissance D. Act on ObjectiveView AnswerAnswer: A
How are Application Fillers or Application Groups used in firewall policy?
How are Application Fillers or Application Groups used in firewall policy?A . An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group B. An Application Filter is a dynamic way to group applications and can be configured as...
Complete the statement. A security profile can block or allow traffic____________
Complete the statement. A security profile can block or allow traffic____________A . on unknown-tcp or unknown-udp traffic B. after it is matched by a security policy that allows traffic C. before it is matched by a security policy D. after it is matched by a security policy that allows or...
Which interface does not require a MAC or IP address?
Which interface does not require a MAC or IP address?A . Virtual Wire B. Layer3 C. Layer2 D. LoopbackView AnswerAnswer: A
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)A . facebook B. facebook-chat C. facebook-base D. facebook-emailView AnswerAnswer: B,C
Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?
Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server. Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?A . antivirus profile applied...