Question 16

The UDP-4501 protocol-port is used between which two GlobalProtect components?
  • Question 17

    A client wants to detect the use of weak and manufacturer-default passwords for loT devices. Which option will help the customer?
  • Question 18

    Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management-plane resources are lightly utilized.
    Given the size of this environment, which User-ID collection method is sufficient?
  • Question 19

    WildFire will submit for analysis blocked files that match which profile settings?
  • Question 20

    What are three valid qualifiers for a Decryption Policy Rule match? (Choose three.)