Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
Which three application options can be selected in the security policy rule? (Choose three.)
Answer : A, B, D
Which two components must to be configured within User-ID on a new firewall that has been implemented? (Choose two.)
A customer is worried about unknown attacks, but due to privacy and regulatory issues, won't implement SSL decrypt.
How can the platform still address this customer's concern?
Answer : A
Which certificate can be used to ensure that traffic coming from a specific server remains encrypted?
Which two designs require virtual systems? (Choose two.)
Answer : B, C
Which three network events are highlighted through correlation objects as a potential security risks? (Choose three.)
Answer : A, B, C