Which three statements accurately describe Decryption Mirror? (Choose three.)
A . Decryption Mirror requires a tap interface on the firewall
B . Decryption, storage, inspection and use of SSL traffic are regulated in certain countries
C . Only management consent is required to use the Decryption Mirror feature
D . You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment
E . Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is submitted via an encrypted channel
Answer: B,D,E
Explanation:
https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/decryption-concepts/decryption-mirroring.html
"Keep in mind that the decryption, storage, inspection, and/or use of SSL traffic is governed in certain countries and user consent might be required in order to use the decryption mirror feature. Additionally, use of this feature could enable malicious users with administrative access to the firewall to harvest usernames, passwords, social security numbers, credit card numbers, or other sensitive information submitted using an encrypted channel. Palo Alto Networks recommends that you consult with your corporate counsel before activating and using this feature in a production environment."
Latest PCNSE Dumps Valid Version with 280 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund