subject

Autm is deployed on the external edge of the main corporate office. the office connects to the wan port of the edge router. the edge router at the main office connects to the remote offices using gre ipsec tunnels. a network administrator notices that a worm that was not detected by the utm has spread from the remote sites into the corporate network. the utm currently has traffic rules applied that should block the port used by the worm. which of the following steps would most likely correct this issue? a. move the utm onto the lan side of the networkb. enable tls inspection on the utmc. enable stateful inspection on the utmd. configure the utm to deny encrypted files from being transferred

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 22:00
What is a distinguishing feature of today’s graphic application software?) graphic applications are used today on a variety of devices, including touch-screen kiosks and mobile phones.
Answers: 3
question
Computers and Technology, 23.06.2019 00:00
Donna and her team of five have invented a new gadget for the science exhibition in their college. which intellectual property right will protect their invention?
Answers: 1
question
Computers and Technology, 23.06.2019 12:30
Animations and transitions are added from the
Answers: 1
question
Computers and Technology, 24.06.2019 18:30
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of file type of operating system used
Answers: 1
You know the right answer?
Autm is deployed on the external edge of the main corporate office. the office connects to the wan p...
Questions
question
Mathematics, 16.01.2020 20:31