Question 16

Which of the following statements is NOT True regarding a Decryption Mirror interface?
  • Question 17

    Wildfire may be used for identifying which of the following types of traffic?
  • Question 18

    Select the implicit rules that are applied to traffic that fails to match any administrator defined Security Policies.
  • Question 19

    When you have created a Security Policy Rule that allows Facebook, what must you do to block all other web browsing traffic?
  • Question 20

    When using remote authentication for users (LDAP, RADIUS, Active Directory, etc.), what must be done to allow a user to authenticate through multiple methods?