Option D makes sense to me. In SCM, reports are usually generated from dashboards you've already set up, since that's where you decide which data and widgets get included. Without configuring the dashboard first, you can't really customize what shows up in the report. Pretty sure that's how it works but open to any other ideas.
I don't think it's D, pretty sure B and C are right for IoT Security. URL Filtering is a common distractor here but not actually required for device baselining. Similar question came up in another set, same answer there. Agree?
I don’t think it’s D here. Enhanced application logs (B) and Threat logs (C) are what IoT Security uses for device discovery and behavior analysis, not URL Filtering. WildFire (A) is another trap since it’s more for malware sandboxing, not core IoT profiling. Pretty sure B and C are what the official docs mention, but chime in if you’ve seen otherwise!
B and C get forwarded for IoT Security since you need device behavior (enhanced app logs) and threat detection. WildFire and URL Filtering aren't strictly needed here. Think that's right but open if anyone knows otherwise.
Yeah, D is right for this. The firewall basically sits as MITM using the internal server's private key on inbound SSL, that's the whole point of inbound inspection. If it was asking about outbound inspection to external sites then C might be correct. Correct me if I missed something!
I thought A at first since the firewall just sits between client and server, kind of transparent. But now I'm thinking that's only if it's not actually doing decryption. SSL Inbound Inspection should make it act more like a MITM, but I could see why someone picks A if they focus on "transparently". Anyone else see it that way?
D imo. SSL Inbound Inspection makes the firewall act as a MITM because it needs the server's private key to actually decrypt traffic going to the internal server. If the cert/private key isn't available, then A would make more sense since it can't inspect anything. Pretty sure D is what exam reports expect though, anybody disagree?
Don't think A or B work since Layer 2 isn't supported by VM-Series in Azure, that's a common trap. C is the one that fits-VM-Series for Azure with Layer 3 zones gives you segmentation and meets compliance rules. If anyone thinks Layer 2 works natively in cloud, I'd double-check that, pretty sure it's unsupported.
C
I figured Layer 2 zones on the VM-Series could handle segmentation in Azure since it lets you isolate traffic without complex routing. Maybe I’m missing something with the compliance part but A looked fine to me.