In the example security policy shown, which two websites fcked? (Choose two.)
Answer : A, B
Given the image, which two options are true about the Security policy rules. (Choose two.)
Answer : A, D
Based on the security policy rules shown, ssh will be allowed on which port?
Answer : C
An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?
Answer : D
Given the topology, which zone type should zone A and zone B to be configured with?
Answer : A