Question 6
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Question 7
When a malware-infected host attempts to resolve a known command-and-control server, the traffic matches a security policy with DNS sinhole enabled, generating a traffic log.
What will be the destination IP Address in that log entry?
What will be the destination IP Address in that log entry?
Question 8
A Security policy rule is configured with a Vulnerability Protection Profile and an action of Deny".
Which action will this configuration cause on the matched traffic?
Which action will this configuration cause on the matched traffic?
Question 9
Which version of Global Protect supports split tunneling based on destination domain, client process, and HTTP/HTTPs video streaming application?
Question 10
An administrator has left a firewall to used default port for all management services.
Which three function performed by the dataplane? (Choose three.)
Which three function performed by the dataplane? (Choose three.)