What is the purpose of an address book?
What is the purpose of an address book?
Which two traffic types trigger pass-through firewall user authentication?
Which two traffic types trigger pass-through firewall user authentication? (Choose two.)
How does the antivirus feature operate once the antivirus license has expired?
How does the antivirus feature operate once the antivirus license has expired?
What are two valid match conditions for source NAT?
What are two valid match conditions for source NAT? (Choose two.)
Which two configuration elements are required for a policy-based VPN?
Which two configuration elements are required for a policy-based VPN? (Choose two.)
Which two statements are true for both express antivirus and full file-based antivirus?
Which two statements are true for both express antivirus and full file-based antivirus? (Choose two.)
Which statement is true about interfaces, zones, and routing-instance relationships?
Which statement is true about interfaces, zones, and routing-instance relationships?
What do you use to group interfaces with similar security requirements?
What do you use to group interfaces with similar security requirements?
Which statement is true when express AV detects a virus in a TCP session?
Which statement is true when express AV detects a virus in a TCP session?
Which statement describes the behavior of a security policy?
Which statement describes the behavior of a security policy?