A. drop
B. pass-through
C. decrypt
D. block
您可能感興趣的試卷
你可能感興趣的試題
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
最新試題
Which of these is not an action that is associated with HTTPS decryption policies?()
Why does L4TM require T1 to be in promiscuous mode?()
Which of the following is NOT provided by AVC?()
Which of these is not part of the pre_ installation worksheet?()
What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?()
If you want to reset your configuration back to the factory defaults but keep your logs and reports,Which CLI command should you use?()
Put the following features in the order they are applied.
Which of these is the best way to convince a prospect of the benefits of the S-Series?()
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()
Which statement is true?()