Which two actions can be configured to allow traffic to traverse an interface when zone-based
security is being employed? (Choose two.)
A.
Pass
B.
Flow
C.
Allow
D.
Inspect
Which two actions can be configured to allow traffic to traverse an interface when zone-based
security is being employed? (Choose two.)
Which two actions can be configured to allow traffic to traverse an interface when zone-based
security is being employed? (Choose two.)
A.
Pass
B.
Flow
C.
Allow
D.
Inspect