Which of the following steps would MOST likely correct this issue?
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPsec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm.
Which of the following steps would MOST likely correct this issue?
A . Move the UTM onto the LAN side of the network
B . Enable TLS inspection on the UTM
C . Enable stateful inspection on the UTM
D . Configure the UTM to deny encrypted files from being transferred
Answer: C
Latest N10-007 Dumps Valid Version with 601 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund