Which two statements are true about the ZTNA rule? (Choose two.)
Understanding ZTNA Rule Configuration:
The ZTNA rule configuration shown in the exhibit defines how traffic is managed and controlled based on specific tags and conditions.
Evaluating Rule Components:
The rule includes security profiles to protect traffic by applying various security checks (A).
The rule also enforces access control by determining which endpoints can access the specified resources based on the ZTNA tag (D).
Eliminating Incorrect Options:
SNAT (Source Network Address Translation) is not mentioned as part of this ZTNA rule.
The rule does not define the access proxy but uses it to enforce access control.
Conclusion:
The correct statements about the ZTNA rule are that it applies security profiles to protect traffic (A) and enforces access control (D).
ZTNA rule configuration documentation from the study guides.
Glory
21 days agoMike
22 days agoGlory
5 days agoParis
10 days agoLeonard
13 days agoWinfred
29 days agoDusti
2 days agoKattie
8 days agoLillian
11 days agoCherry
16 days agoLuann
30 days agoTrinidad
1 months agoWhitley
1 months ago