ExamGecko
Question list
Search
Search

Related questions











Question 369 - PCNSE discussion

Report
Export

An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.

Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?

A.
Use RSA instead of ECDSA for traffic that isn't sensitive or high-priority.
Answers
A.
Use RSA instead of ECDSA for traffic that isn't sensitive or high-priority.
B.
Use the highest TLS protocol version to maximize security.
Answers
B.
Use the highest TLS protocol version to maximize security.
C.
Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority.
Answers
C.
Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority.
D.
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Answers
D.
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Suggested answer: C

Explanation:

Decryption can be resource-intensive, and in scenarios where the firewall is nearing its resource limits, optimizing decryption practices is crucial. One way to do this is by choosing more efficient encryption algorithms that require less computational power.

C) Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority:

Elliptic Curve Digital Signature Algorithm (ECDSA) is known for requiring smaller key sizes compared to RSA for a comparable level of security. This translates to less computational overhead during the encryption and decryption processes.

By using ECDSA for traffic that isn't sensitive or high-priority, the administrator can reduce the processing load associated with decryption on the firewall. This is particularly beneficial in scenarios where resource optimization is necessary.

It's important to note that this approach does not compromise the security of encrypted traffic. Instead, it offers a more resource-efficient way to manage decryption, thus helping to maintain firewall performance even when system resources are under significant demand.

By judiciously applying this strategy, administrators can manage the decryption workload on the firewall, ensuring continued protection and inspection of encrypted traffic without overburdening the firewall's resources.

asked 23/09/2024
Jose Alberto Vecino Pacheco
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first