A) Three; security management, Security Gateway, and endpoint security
B) Three; Security gateway, endpoint security, and gateway management
C) Two; security management and endpoint security
D) Two; endpoint security and Security Gateway
Correct Answer
verified
Multiple Choice
A) Five
B) Two
C) Three
D) Four
Correct Answer
verified
Multiple Choice
A) Application Control
B) Data Awareness
C) URL Filtering
D) Threat Emulation
Correct Answer
verified
Multiple Choice
A) Threat Emulation
B) Access Control
C) QoS
D) Threat Prevention
Correct Answer
verified
Multiple Choice
A) All Site-to-Site VPN Communities
B) Accept all encrypted traffic
C) All Connections (Clear or Encrypted)
D) Specific VPN Communities
Correct Answer
verified
Multiple Choice
A) fwd
B) fwm
C) cpd
D) cpwd
Correct Answer
verified
Multiple Choice
A) "Edit layers by Software Blades" is unselected in the Administrator Permission Profile
B) There are no Administrator Permission Profiles available and you need to create one first.
C) All Administrator Permission Profiles are in use.
D) There are no Administrator Permission Profiles defined with limited access privileges.
Correct Answer
verified
Multiple Choice
A) Pencil
B) Padlock
C) Book
D) Eyeglasses
Correct Answer
verified
Multiple Choice
A) 18210
B) 18184
C) 257
D) 18191
Correct Answer
verified
Multiple Choice
A) Security Gateway
B) Management container
C) Management server
D) Security Gateway container
Correct Answer
verified
Multiple Choice
A) Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation.
B) Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging.
C) Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic.
D) Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings.
Correct Answer
verified
Multiple Choice
A) Block Port Overflow
B) Local Interface Spoofing
C) Suspicious Activity Monitoring
D) Adaptive Threat Prevention
Correct Answer
verified
Multiple Choice
A) Expert
B) Clish
C) Admin
D) Normal
Correct Answer
verified
Multiple Choice
A) Manage and Command Line
B) Logs and Monitor
C) Security Policies
D) Gateway and Servers
Correct Answer
verified
Multiple Choice
A) Static NAT, IP pool NAT, hide NAT
B) IP pool NAT, static NAT, hide NAT
C) Static NAT, automatic NAT, hide NAT
D) Static NAT, hide NAT, IP pool NAT
Correct Answer
verified
Multiple Choice
A) Save backup
B) System backup
C) snapshot
D) Migrate
Correct Answer
verified
Multiple Choice
A) Always delivers a file to user
B) Works on all MS Office, Executables, and PDF files
C) Can take up to 3 minutes to complete
D) Delivers file only if no threats found
Correct Answer
verified
Multiple Choice
A) Symmetric routing
B) Failovers
C) Asymmetric routing
D) Anti-Spoofing
Correct Answer
verified
Multiple Choice
A) Change the gateway settings to allow Captive Portal access via an external interface.
B) No action is necessary. This access is available by default.
C) Change the Identity Awareness settings under Global Properties to allow Captive Policy access on all interfaces.
D) Change the Identity Awareness settings under Global Properties to allow Captive Policy access for an external interface.
Correct Answer
verified
Multiple Choice
A) Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is used only for OS level tasks.
B) Configuration changes should be done in expert-mode and CLISH is used for monitoring.
C) Configuration changes should be done in mgmt-cli and use expert-mode for OS-level tasks.
D) All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks.
Correct Answer
verified
Showing 201 - 220 of 676
Related Exams