List of questions
Related questions
Question 30 - PCNSE discussion
A network security engineer wants to prevent resource-consumption issues on the firewall.
Which strategy is consistent with decryption best practices to ensure consistent performance?
A.
Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processorintensive decryption methods for lower-risk traffic
B.
Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processorintensive decryption methods for tower-risk traffic
C.
Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
D.
Use Decryption profiles to drop traffic that uses processor-intensive ciphers
Your answer:
0 comments
Sorted by
Leave a comment first