Multiple Choice
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
A) Move the UTM onto the LAN side of the network
B) Enable TLS inspection on the UTM
C) Enable stateful inspection on the UTM
D) Configure the UTM to deny encrypted files from being transferred
Correct Answer:

Verified
Correct Answer:
Verified
Q787: Ann, a user, is attempting to charge
Q788: Which of the following technologies relies on
Q789: A technician is downloading an ISO from
Q790: A technician is required to install a
Q791: Which of the following creates a secure
Q793: When trying to determine why users are
Q794: A junior network technician is working in
Q795: A network technician is performing a firmware
Q796: A network team at a large company
Q797: A network technician is assisting a user