Which two actions are available for antivirus security profiles? (Choose two.) A. continue B. allow C. block IP D. alert - answerB. allow D. alert Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) A. Userâ€Agent B. Safe Search C. URL redirection D. Xâ€Forwardâ€For - answerA. Userâ€Agent D. Xâ€Forwardâ€For What are the two components of Denialâ€ofâ€Service Protection? (Choose two.) A. zone protection profile B. DoS protection profile and policy rules C. flood protection D. reconnaissance protection - answerA. zone protection profile B. DoS protection profile and policy rules Which two types of attacks does the PANâ€DB prevent? (Choose two.) A. phishing sites B. HTTP based commandâ€andâ€control C. infected JavaScript D. flood attacks - answerA. phishing sites B. HTTP based commandâ€andâ€control Which two valid URLs can be used in a custom URL category? (Choose two.) A. ww.youtube.** B. www.**.com C. www.youtube.com D. *.youtube.com - answerC. www.youtube.com D. *.youtube.com What are three methods of mapping usernames to IP addresses? (Choose three.) A. Server Monitoring B. Traps C. Minemeld D. syslog E. AutoFocus F. port mapping - answerA. Server Monitoring D. syslog F. port mapping Which type of server profile is used to create group mappings? A. RADIUS B. TACACS+
  