Question 7

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

Correct Answer:A

Question 8

Which option shows the attributes that are selectable when setting up application filters?

Correct Answer:B

Question 9

Complete the statement. A security profile can block or allow traffic.

Correct Answer:D

Question 10

Which statement is true regarding a Prevention Posture Assessment?

Correct Answer:B

Question 11

What are three differences between security policies and security profiles? (Choose three.)

Correct Answer:BCE

Question 12

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

Correct Answer:A

START PCNSA EXAM