Given the topology, which zone type should zone A and zone B to be configured with?
When is the content inspection performed in the packet flow process?
Which security profile should be used to classify malicious web content?
Which order of steps is the correct way to create a static route?