Question: 1
All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone. Complete the two empty fields in the Security Policy rules that permits only this type of access.
Choose two.
Question: 2
Which statements is true regarding a Heatmap report?
Question: 3
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Question: 4
Complete the statement. A security profile can block or allow traffic.
Question: 5
Which option shows the attributes that are selectable when setting up application filters?
A Category, Subcategory, Technology, and Characteristic
B Category, Subcategory, Technology, Risk, and Characteristic
C Name, Category, Technology, Risk, and Characteristic
D Category, Subcategory, Risk, Standard Ports, and Technology
Answer : B
Show Answer
Hide Answer