Question: 1
Only two Trust to Untrust allow rules have been created in the Security policy
Rule1 allows google-base
Rule2 allows youtube-base
Which action will allow youtube.com display in the browser correctly?
Question: 2
Which three log-forwarding destinations require a server profile to be configured? (Choose three)
Question: 3
A critical US-CERT notification is published regarding a newly discovered botnet. The malware is very evasive and is not reliably detected by endpoint antivirus software. Furthermore, SSL is used to tunnel malicious traffic to command-and-control servers on the internet and SSL Forward Proxy Decryption is not enabled.
Which component once enabled on a perirneter firewall will allow the identification of existing infected hosts in an environment?
Question: 4
To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?
Question: 5
A network engineer has revived a report of problems reaching 98.139.183.24 through vr1 on the firewall. The routing table on this firewall is extensive and complex.
Which CLI command will help identify the issue?