Question 6

During the packet flow process, which two processes are performed in application identification? (Choose two.)
  • Question 7

    When a malware-infected host attempts to resolve a known command-and-control server, the traffic matches a security policy with DNS sinhole enabled, generating a traffic log.
    What will be the destination IP Address in that log entry?
  • Question 8

    A Security policy rule is configured with a Vulnerability Protection Profile and an action of Deny".
    Which action will this configuration cause on the matched traffic?
  • Question 9

    Which version of Global Protect supports split tunneling based on destination domain, client process, and HTTP/HTTPs video streaming application?
  • Question 10

    An administrator has left a firewall to used default port for all management services.
    Which three function performed by the dataplane? (Choose three.)