An administrator is building Security rules within a device group to block traffic to and from malicious locations. How should those rules be configured to ensure that they are evaluated with a high priority?
A.
Create the appropriate rules with a Block action and apply them at the top of the local firewall Security rules
B.
Create the appropriate rules with a Block action and apply them at the top of the Security Pre-Rules
C.
Create the appropriate rules with a Block action and apply them at the top of the Security Post-Rules
D.
Create the appropriate rules with a Block action and apply them at the top of the Default Rules
B - pre rules are evaluated first, then local, then post and the default rules are at the bottom
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.PCNSE Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Sammy3637
11 months agoconfusion
2 years agoTAKUM1y
2 years agomysteryzjoker
2 years ago