Which two statements are true about the ZTNA rule? (Choose two.)
Understanding ZTNA Rule Configuration:
The ZTNA rule configuration shown in the exhibit defines how traffic is managed and controlled based on specific tags and conditions.
Evaluating Rule Components:
The rule includes security profiles to protect traffic by applying various security checks (A).
The rule also enforces access control by determining which endpoints can access the specified resources based on the ZTNA tag (D).
Eliminating Incorrect Options:
SNAT (Source Network Address Translation) is not mentioned as part of this ZTNA rule.
The rule does not define the access proxy but uses it to enforce access control.
Conclusion:
The correct statements about the ZTNA rule are that it applies security profiles to protect traffic (A) and enforces access control (D).
ZTNA rule configuration documentation from the study guides.
Mariann
2 months agoLezlie
2 months agoRosalyn
24 days agoDannie
1 months agoCassandra
1 months agoGlory
2 months agoMike
2 months agoGlory
2 months agoParis
2 months agoLeonard
2 months agoWinfred
3 months agoDusti
2 months agoKattie
2 months agoLillian
2 months agoCherry
2 months agoLuann
3 months agoTrinidad
3 months agoWhitley
3 months ago