ExamGecko
Question list
Search
Search

Related questions











Question 18 - PCNSE discussion

Report
Export

When planning to configure SSL Froward Proxy on a PA 5260, a user asks how SSL decryption can be implemented using phased approach in alignment with Palo Alto Networks best practices What should you recommend?

A.
Enable SSL decryption for known malicious source IP addresses
Answers
A.
Enable SSL decryption for known malicious source IP addresses
B.
Enable SSL decryption for source users and known malicious URL categories
Answers
B.
Enable SSL decryption for source users and known malicious URL categories
C.
Enable SSL decryption for malicious source users
Answers
C.
Enable SSL decryption for malicious source users
D.
Enable SSL decryption for known malicious destination IP addresses
Answers
D.
Enable SSL decryption for known malicious destination IP addresses
Suggested answer: B

Explanation:

According to the Palo Alto Networks best practices, one of the ways to implement SSL decryption using a phased approach is to enable SSL decryption for source users and known malicious URL categories. This will allow you to block or alert on traffic that is likely to be malicious or risky, while minimizing the impact on legitimate traffic and user privacy. Reference:https://docs.paloaltonetworks.com/best-practices/9-1/decryption-best-practices/decryption-best- practices/ deploy-ssl-decryption-using-a-phased-approach

asked 23/09/2024
CRISTIAN FONSECA
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first