Which Security profile can you apply to protect against malware such as worms and Trojans?
Option B enables the required traffic by allowing SSL and web-browsing from UNTRUST to DMZ, denying SSH from UNTRUST to DMZ, allowing MYSQL from DMZ to SERVER, and allowing SSH from SERVER to DMZ. Option A allows SSH from UNTRUST to DMZ, which is not required. Option C denies all the required traffic.Option D denies all traffic from UNTRUST to TRUST, which is irrelevant to the question
https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator
Limited Time Offer
25%
Off
Deangelo
24 days agoMerilyn
26 days agoBarrett
9 days agoAlverta
20 days agoQuentin
22 days agoMichell
1 months agoDean
18 days agoKiley
22 days agoWillodean
28 days agoAyesha
2 months agoCammy
15 days agoJonelle
2 months agoTuyet
15 days agoAnnmarie
1 months agoShawnee
2 months agoLuisa
2 months agoWeldon
2 months ago