ExamGecko
Question list
Search
Search

Related questions











Question 30 - PCNSE discussion

Report
Export

A network security engineer wants to prevent resource-consumption issues on the firewall.

Which strategy is consistent with decryption best practices to ensure consistent performance?

A.
Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processorintensive decryption methods for lower-risk traffic
Answers
A.
Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processorintensive decryption methods for lower-risk traffic
B.
Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processorintensive decryption methods for tower-risk traffic
Answers
B.
Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processorintensive decryption methods for tower-risk traffic
C.
Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
Answers
C.
Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
D.
Use Decryption profiles to drop traffic that uses processor-intensive ciphers
Answers
D.
Use Decryption profiles to drop traffic that uses processor-intensive ciphers
Suggested answer: C

Explanation:

According to the Palo Alto Networks documentation, "Decryption Profiles define the cipher suite settings the firewall accepts so you can protect against vulnerable, weak protocols and algorithms.You can also use Decryption Profiles to downgrade processor-intensive ciphers to ciphers that areless processor-intensive." Reference: https://docs.paloaltonetworks.com/best-practices/10-2/decryption-best-practices/decryption-best-practices/data-center-decryption-profile.html

asked 23/09/2024
Marcelo Oliveira
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first