The transfer of encrypted files or the use of encrypted protocols between users and servers on the internet can frustrate the efforts of administrators attempting to monitor traffic passing through the FortiGate unit and ensuring user compliance to corporate rules.Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit? (Select all that apply.)
Question:
Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit?
Options:
Encrypted protocols can be scanned through the use of the SSL proxy.
DLP rules can be used to block the transmission of encrypted files.
Firewall authentication can be enabled in the firewall policy, preventing the use of encrypted communications channels.
Application control can be used to monitor the use of encrypted protocols; alerts can be sent to the administrator through email when the use of encrypted protocols is attempted.
Correct Answer
The Correct Answer for this Question is
Encrypted protocols can be scanned through the use of the SSL proxy.
DLP rules can be used to block the transmission of encrypted files.
Application control can be used to monitor the use of encrypted protocols; alerts can be sent to the administrator through email when the use of encrypted protocols is attempted.