What is considered the best practice with regards to zone protection?
A . Review DoS threat activity (ACC > Block Activity) and look for patterns of abuse
B . Use separate log-forwarding profiles to forward DoS and zone threshold event logs separately from other threat logs
C . If the levels of zone and DoS protection consume too many firewall resources, disable zone protection
D . Set the Alarm Rate threshold for event-log messages to high severity or critical severity
Answer: C
Latest PCNSE Dumps Valid Version with 280 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund