Question 16
Which of the following statements is NOT True regarding a Decryption Mirror interface?
Question 17
Wildfire may be used for identifying which of the following types of traffic?
Question 18
Select the implicit rules that are applied to traffic that fails to match any administrator defined Security Policies.
Question 19
When you have created a Security Policy Rule that allows Facebook, what must you do to block all other web browsing traffic?
Question 20
When using remote authentication for users (LDAP, RADIUS, Active Directory, etc.), what must be done to allow a user to authenticate through multiple methods?