Question 6
How are Application Fillers or Application Groups used in firewall policy?
Question 7
Which data flow direction is protected in a zero trust firewall deployment that is not protected in a perimeter-only firewall deployment?
Question 8
Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?
Question 9
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.


Question 10
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?