Which of the following statements is false regarding Firewall rules using the Bypass action?
A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.
B. Firewall rules using the Bypass action do not generate log events.
C. Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.
D. Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.
Answer: A
Explanation:
Firewall rules using Bypass have the following noteworthy characteristics:
• Bypass skips both Firewall and Intrusion Prevention analysis.
• Since stateful inspection is for bypassed traffic, bypassing traffic in one direction does not automatically bypass the response in the other direction. As a result firewall rules using Bypass are always created in pairs, one for incoming traffic and another for outgoing.
• Firewall rules using Bypass will not be logged. This is not a configurable behavior.
• Some firewall rules using Bypass are optimized, in that traffic will flow as efficiently as if the Deep Security Agent/Deep Security Virtual Appliance was not there.
Explication: Study Guide – page (236)
Latest Deep Security Professional Dumps Valid Version with 80 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund