A. The default action of the access control policy is set to Network Discovery Only.
B. A file policy was not created and deployed on the threat defense.
C. An SSL policy is not invoked in the access control policy.
D. The SSL decryption license is not applied on the threat defense.
C. An SSL policy is not invoked in the access control policy.
A. Decryption of encrypted traffic can impact overall throughput.
B. SSL rules that require the least amount of information to determine the outcome should be placed at the top in order.
C. When positioning the SSL rules, place the Block and Do Not Decrypt actions before the rules that have Decrypt Known Key and Decrypt Resign actions.
D. All of these answers are correct.
D. All of these answers are correct.
A. Add an SSL rule for the matching traffic with the Decrypt - Resign action.
B. Add an access control rule for matching traffic with the Allow action.
C. Add a file rule to block the executable file type.
D. All of these answers are correct
D. All of these answers are correct.
A. In an access control rule, add a rule condition to block port 443 (under the Ports tab).
B. In an access control rule, add a rule condition to block an HTTPS application (under the Applications tab).
C. In an SSL policy, choose the Block action for an SSLv2 session (under the Undecryptable Action tab).
D. In an SSL rule, add a rule condition to block the SSLv2 protocol (under the Version tab).
C. In an SSL policy, choose the Block action for an SSLv2 session (under the Undecryptable Action tab).
A. The connection events page at Analysis > Connections > Events
B. The file events page at Analysis > Files > File Events
C. The Connection summary dashboard
D. All of these answers are correct.
D. All of the views in the GUI display the SSL status and action.