What three elements can be configured in firewall polices to detect network-based malware?

What three elements can be configured in firewall polices to detect network-based malware? (Choose three.)
A. commonly used rainbow hash tables
B. commonly used protocols
C. SHA-256 hashes
D. metadata stored that is within the files
E. access control lists (ACLs)

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.