Notifications
Clear all

How should those rules be configured to ensure that they are evaluated with a high priority?

1 Posts
1 Users
0 Likes
100 Views
(@burlandeldridge)
Posts: 713
Noble Member
Topic starter
 

An administrator is building Security rules within a device group to block traffic to and from malicious locations

How should those rules be configured to ensure that they are evaluated with a high priority?

  • A . Create the appropriate rules with a Block action and apply them at the top of the Default Rules
    B. Create the appropriate rules with a Block action and apply them at the top of the Security Post-Rules.
    C. Create the appropriate rules with a Block action and apply them at the top of the local firewall Security rules.
    D. Create the appropriate rules with a Block action and apply them at the top of the Security Pre-Rules

Show Answer Hide Answer

Suggested Answer: D
 
Posted : 25/10/2022 8:01 pm

Latest PCNSE V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: