Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Answer : C
An administrator wants to prevent users from submitting corporate credentials in a phishing attack.
Which Security profile should be applied?
Answer : B
What is considered best practice with regards to committing configuration changes?
Answer : A
Selecting the option to revert firewall changes will replace what settings?
Answer : C
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?
Answer : A
An administrator is reviewing another administrator s Security policy log settings
Which log setting configuration is consistent with best practices tor normal traffic?
Answer : B
Which type of profile must be applied to the Security policy rule to protect against buffer overflows illegal code execution and other attempts to exploit system flaws''
Answer : C