Q: 18
An engineer must configure network systems to detect command-and-control communications by
decrypting ingress and egress perimeter traffic and allowing network security devices to detect
malicious outbound communications. Which technology must be used to accomplish this task?
Options
Discussion
Not B, C. Saw a similar question on a practice test and certificates are what let perimeter devices decrypt traffic for inspection.
Had something like this in a mock before, it's C. Digital certificates are needed for decryption on perimeter devices so they can scan the traffic. Pretty straightforward if you're familiar with SSL/TLS inspection. Let me know if anyone picked differently.
C
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Be respectful. No spam.