Notifications
Clear all

Which strategy is consistent with decryption best practices to ensure consistent performance?

1 Posts
1 Users
0 Likes
100 Views
(@pochethurman)
Posts: 704
Noble Member
Topic starter
 

A network security engineer wants to prevent resource-consumption issues on the firewall.

Which strategy is consistent with decryption best practices to ensure consistent performance?

  • A . Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic
    B. Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for tower-risk traffic
    C. Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
    D. Use Decryption profiles to drop traffic that uses processor-intensive ciphers

Show Answer Hide Answer

Suggested Answer: B
 
Posted : 18/01/2023 4:05 am

Latest PCNSE V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: