When planning to configure SSL Froward Proxy on a PA 5260, a user asks how SSL decryption can be implemented using phased approach in alignment with Palo Alto Networks best practices
What should you recommend?
A . Enable SSL decryption for known malicious source IP addresses
B . Enable SSL decryption for source users and known malicious URL categories
C . Enable SSL decryption for malicious source users
D . Enable SSL decryption for known malicious destination IP addresses
Answer: D
Latest PCNSE Dumps Valid Version with 280 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund