Question 16
The UDP-4501 protocol-port is used between which two GlobalProtect components?
Question 17
A client wants to detect the use of weak and manufacturer-default passwords for loT devices. Which option will help the customer?
Question 18
Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management-plane resources are lightly utilized.
Given the size of this environment, which User-ID collection method is sufficient?
Given the size of this environment, which User-ID collection method is sufficient?
Question 19
WildFire will submit for analysis blocked files that match which profile settings?
Question 20
What are three valid qualifiers for a Decryption Policy Rule match? (Choose three.)