Notifications
Clear all
Topic starter
An administrator is building Security rules within a device group to block traffic to and from malicious locations
How should those rules be configured to ensure that they are evaluated with a high priority?
- A . Create the appropriate rules with a Block action and apply them at the top of the Default Rules
B. Create the appropriate rules with a Block action and apply them at the top of the Security Post-Rules.
C. Create the appropriate rules with a Block action and apply them at the top of the local firewall Security rules.
D. Create the appropriate rules with a Block action and apply them at the top of the Security Pre-Rules
Suggested Answer: D
Posted : 16/11/2022 6:52 am