Podcast
Questions and Answers
What are two probe methods that you can use for logical probes? (Select all that apply)
What are two probe methods that you can use for logical probes? (Select all that apply)
Which action object is used to throttle the traffic?
Which action object is used to throttle the traffic?
BWM
Which of the following Address Object types is selected by default in the firewall?
Which of the following Address Object types is selected by default in the firewall?
Host
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?
Signup and view all the answers
Where is the real-time data on the Dashboard compiled and summarized from?
Where is the real-time data on the Dashboard compiled and summarized from?
Signup and view all the answers
What type of information is displayed on the Live Monitor panel? (Select all that apply)
What type of information is displayed on the Live Monitor panel? (Select all that apply)
Signup and view all the answers
Which file types can be used to export the logs? (Select all that apply)
Which file types can be used to export the logs? (Select all that apply)
Signup and view all the answers
What is the default timeout setting for administrator inactivity?
What is the default timeout setting for administrator inactivity?
Signup and view all the answers
What type of encoding format is supported when importing an end-user certificate with a private key?
What type of encoding format is supported when importing an end-user certificate with a private key?
Signup and view all the answers
Which SonicOS GUI option is used to create a snapshot of the current system state?
Which SonicOS GUI option is used to create a snapshot of the current system state?
Signup and view all the answers
Which interface is used by SonicOS as the backup heartbeat link?
Which interface is used by SonicOS as the backup heartbeat link?
Signup and view all the answers
The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.
The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.
Signup and view all the answers
Which setting is used to turn on the CFS Security Service?
Which setting is used to turn on the CFS Security Service?
Signup and view all the answers
Which Security Configuration menu option is used to enable client DPI-SSL?
Which Security Configuration menu option is used to enable client DPI-SSL?
Signup and view all the answers
Which Match Object will control what type of policy it can be used in?
Which Match Object will control what type of policy it can be used in?
Signup and view all the answers
What are the key components of a CFS policy? (Select all that apply)
What are the key components of a CFS policy? (Select all that apply)
Signup and view all the answers
Which Logs panel depicts the Eicar test virus file download?
Which Logs panel depicts the Eicar test virus file download?
Signup and view all the answers
A Site-to-Site VPN can allow simultaneous access to multiple remote servers.
A Site-to-Site VPN can allow simultaneous access to multiple remote servers.
Signup and view all the answers
Which statement about SonicWall Gateway Anti-Virus service is correct?
Which statement about SonicWall Gateway Anti-Virus service is correct?
Signup and view all the answers
Which of the following sentences is correct about HA configuration?
Which of the following sentences is correct about HA configuration?
Signup and view all the answers
What type of NAT policies does a Public Server wizard create?
What type of NAT policies does a Public Server wizard create?
Signup and view all the answers
Which of the following are included in the output of a network probe? (Select all that apply)
Which of the following are included in the output of a network probe? (Select all that apply)
Signup and view all the answers
What are two route policy modes that are enabled by Dynamic Routing?
What are two route policy modes that are enabled by Dynamic Routing?
Signup and view all the answers
Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?
Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?
Signup and view all the answers
Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?
Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?
Signup and view all the answers
Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)
Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)
Signup and view all the answers
What does a WAN Failover solution enable? (Select all that apply)
What does a WAN Failover solution enable? (Select all that apply)
Signup and view all the answers
In the Event Logs, which of the following will generate a log message for any dropped packets?
In the Event Logs, which of the following will generate a log message for any dropped packets?
Signup and view all the answers
What type of certificate store can be used to install the certificate?
What type of certificate store can be used to install the certificate?
Signup and view all the answers
What is the SonicOS navigation path to begin configuring the VPN on the firewall?
What is the SonicOS navigation path to begin configuring the VPN on the firewall?
Signup and view all the answers
What type of object is created to configure a VPN host when implementing a Site-to-site VPN?
What type of object is created to configure a VPN host when implementing a Site-to-site VPN?
Signup and view all the answers
What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?
What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?
Signup and view all the answers
Which feature facilitates the setup and deployment of multiple global VPN clients?
Which feature facilitates the setup and deployment of multiple global VPN clients?
Signup and view all the answers
What does the LDAP server provide to allow or deny user authorization?
What does the LDAP server provide to allow or deny user authorization?
Signup and view all the answers
Which group of Security Services uses the SonicWall Deep Packet Inspection engine?
Which group of Security Services uses the SonicWall Deep Packet Inspection engine?
Signup and view all the answers
Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)
Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)
Signup and view all the answers
In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)
In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)
Signup and view all the answers
Which packet status types are indicated by the Packet Monitor? (Select all that apply)
Which packet status types are indicated by the Packet Monitor? (Select all that apply)
Signup and view all the answers
Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?
Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?
Signup and view all the answers
Which diagnostic tool tests for MySonicWall server connectivity?
Which diagnostic tool tests for MySonicWall server connectivity?
Signup and view all the answers
What options are used to preempt an administrator logged into the firewall? (Select all that apply)
What options are used to preempt an administrator logged into the firewall? (Select all that apply)
Signup and view all the answers
Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)
Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)
Signup and view all the answers
What type of information does the DHCP server help distribute to network clients? (Select all that apply)
What type of information does the DHCP server help distribute to network clients? (Select all that apply)
Signup and view all the answers
When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.
When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.
Signup and view all the answers
Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)
Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)
Signup and view all the answers
Which of the following are predefined zones in SonicOS? (Select all that apply)
Which of the following are predefined zones in SonicOS? (Select all that apply)
Signup and view all the answers
Sub-interfaces on the SonicWall firewall add support for VLANs.
Sub-interfaces on the SonicWall firewall add support for VLANs.
Signup and view all the answers
Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)
Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)
Signup and view all the answers
Where do you configure the User Authentication method in SonicOS?
Where do you configure the User Authentication method in SonicOS?
Signup and view all the answers
Which authentication method is recommended for a relatively small and limited number of users?
Which authentication method is recommended for a relatively small and limited number of users?
Signup and view all the answers
Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)
Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)
Signup and view all the answers
Who among the following can manage Guest Accounts and Sessions?
Who among the following can manage Guest Accounts and Sessions?
Signup and view all the answers
Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)
Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)
Signup and view all the answers
Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)
Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)
Signup and view all the answers
Static routes, by default, take precedence over VPN traffic.
Static routes, by default, take precedence over VPN traffic.
Signup and view all the answers
Which feature is used to create a predefined email notification with a defined subject?
Which feature is used to create a predefined email notification with a defined subject?
Signup and view all the answers
Which log setting is used to change event attributes globally, using flexible match conditions?
Which log setting is used to change event attributes globally, using flexible match conditions?
Signup and view all the answers
What type of information is displayed on the Protocol Monitor? (Select all that apply)
What type of information is displayed on the Protocol Monitor? (Select all that apply)
Signup and view all the answers
Choose two methods that SonicWall provides for managing global IPS and Anti-Spyware attack threats. (Select all that apply)
Choose two methods that SonicWall provides for managing global IPS and Anti-Spyware attack threats. (Select all that apply)
Signup and view all the answers
Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)
Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)
Signup and view all the answers
What is the navigation path to configuring the Advanced App Control settings in SonicOS?
What is the navigation path to configuring the Advanced App Control settings in SonicOS?
Signup and view all the answers
Identify the best practices that are related to configuring App Control. (Select all that apply)
Identify the best practices that are related to configuring App Control. (Select all that apply)
Signup and view all the answers
Which of the following will enable you to implement transparent role-based security management?
Which of the following will enable you to implement transparent role-based security management?
Signup and view all the answers
Which Security Configuration menu option is used to enable client DPI-SSL?
Which Security Configuration menu option is used to enable client DPI-SSL?
Signup and view all the answers
Which of the following are supported by DPI-SSL? (Select all that apply)
Which of the following are supported by DPI-SSL? (Select all that apply)
Signup and view all the answers
What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?
What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?
Signup and view all the answers
Which policy type is selected when configuring the security policy of a Route-based VPN?
Which policy type is selected when configuring the security policy of a Route-based VPN?
Signup and view all the answers
Which of the following services must be enabled to use Capture ATP?
Which of the following services must be enabled to use Capture ATP?
Signup and view all the answers
Which of the following are Address Object types? (Select all that apply)
Which of the following are Address Object types? (Select all that apply)
Signup and view all the answers
What do virtual interfaces enable?
What do virtual interfaces enable?
Signup and view all the answers
In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)
In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)
Signup and view all the answers
Where are the results of network probes displayed? (Select all that apply)
Where are the results of network probes displayed? (Select all that apply)
Signup and view all the answers
Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?
Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?
Signup and view all the answers
What type of information is displayed on the Appliance Health panel? (Select all that apply)
What type of information is displayed on the Appliance Health panel? (Select all that apply)
Signup and view all the answers
Which tab on the SonicOS management interface displays the visualization Dashboard?
Which tab on the SonicOS management interface displays the visualization Dashboard?
Signup and view all the answers
Which Connection Monitor depicts the number of active connections?
Which Connection Monitor depicts the number of active connections?
Signup and view all the answers
Which of the following are default Event Log Filters? (Select all that apply)
Which of the following are default Event Log Filters? (Select all that apply)
Signup and view all the answers
Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)
Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)
Signup and view all the answers
Which option is a common mechanism for preventing routing loops?
Which option is a common mechanism for preventing routing loops?
Signup and view all the answers
Policy-Based Routing routes traffic based on various user-defined variable.
Policy-Based Routing routes traffic based on various user-defined variable.
Signup and view all the answers
Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?
Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?
Signup and view all the answers
Where do you add a Guest Services profile in SonicOS?
Where do you add a Guest Services profile in SonicOS?
Signup and view all the answers
Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?
Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?
Signup and view all the answers
What types of mapping does ARP enable?
What types of mapping does ARP enable?
Signup and view all the answers
Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?
Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?
Signup and view all the answers
Which setup feature also requires a string password setting to avoid potential security vulnerabilities?
Which setup feature also requires a string password setting to avoid potential security vulnerabilities?
Signup and view all the answers
Which panel of the SonicOS management interface is used to define password restrictions?
Which panel of the SonicOS management interface is used to define password restrictions?
Signup and view all the answers
Select the two methods you can use to register the SonicWall appliance. (Select all that apply)
Select the two methods you can use to register the SonicWall appliance. (Select all that apply)
Signup and view all the answers
If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)
If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)
Signup and view all the answers
Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)
Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)
Signup and view all the answers
SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny' blocking all outbound WAN traffic. Which of the following statements is applicable in this context?
SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny' blocking all outbound WAN traffic. Which of the following statements is applicable in this context?
Signup and view all the answers
Which Filtering option allows you to exclude events at lower priority?
Which Filtering option allows you to exclude events at lower priority?
Signup and view all the answers
Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)
Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)
Signup and view all the answers
What type of system schedule options can be defined in SonicOS? (Select all that apply)
What type of system schedule options can be defined in SonicOS? (Select all that apply)
Signup and view all the answers
Which option is recommended to be left unchecked when using Stateful HA?
Which option is recommended to be left unchecked when using Stateful HA?
Signup and view all the answers
What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)
What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)
Signup and view all the answers
What type of information is displayed on the Threat Protection panel? (Select all that apply)
What type of information is displayed on the Threat Protection panel? (Select all that apply)
Signup and view all the answers
How do you enable dynamic OSF routing on the SonicWall firewall?
How do you enable dynamic OSF routing on the SonicWall firewall?
Signup and view all the answers
DPI-SSL examines SSL traffic, regardless of the port number.
DPI-SSL examines SSL traffic, regardless of the port number.
Signup and view all the answers
Where is the HA interfaces tab used to define the mode for the primary firewall? What is the SonicOS navigation path for HA configuration?
Where is the HA interfaces tab used to define the mode for the primary firewall? What is the SonicOS navigation path for HA configuration?
Signup and view all the answers
Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?
Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?
Signup and view all the answers
What is the navigation path to configure Failover and Load Balancing in SonicOS?
What is the navigation path to configure Failover and Load Balancing in SonicOS?
Signup and view all the answers
Which object type represents the conditions that must be met in an App Rule policy?
Which object type represents the conditions that must be met in an App Rule policy?
Signup and view all the answers
Where is the real-time data collection enabled and configured from in the SonicOS management interface?
Where is the real-time data collection enabled and configured from in the SonicOS management interface?
Signup and view all the answers
What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)
What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)
Signup and view all the answers
Which user group can have Bookmarks configured for them?
Which user group can have Bookmarks configured for them?
Signup and view all the answers
The Public Server guide assigns the server automatically to the zone to which its IP address belongs.
The Public Server guide assigns the server automatically to the zone to which its IP address belongs.
Signup and view all the answers
Study Notes
SonicWall Firewall
- Probe methods for logical probes: Ping and TCP
- Action object for traffic throttling: BWM
- Default Address Object type in firewall: Host
- Diagnostic utility for packet inspection: Packet Monitor
- Real-time data source for Dashboard: AppFlow
- Live Monitor panel displays: Multi-Core Monitor and Connection Count
- Log export file types: Email and CSV
- Default administrator inactivity timeout: 5 minutes
- Encoding format for end-user certificate import: PKCS#12
- GUI option for system snapshot: Create Backup
- Backup heartbeat link interface: X3
- Firewall snapshot displays encrypted traffic percentage: True
- Setting to activate CFS Security Service: Enable Content Filtering Service
- Security Configuration menu option for client DPI-SSL: Decryption Services
- Match object type determines: Policy type
- Key components of CFS policy: Bandwidth Management, authenticate and block
- Logs panel displaying Eicar test virus file download: AppFlow Logs
- Site-to-Site VPN allows simultaneous access to multiple remote servers: True
- SonicWall Gateway Anti-Virus service functionality: Scans TCP stream-based protocols, in addition to common Web and email protocols
- HA configuration restriction: Cannot be configured while PortShield is active
- Public Server wizard NAT policy types: Inbound, Outbound, and Loopback NAT Policies
- Network probe output: IP addressing, probe target and type, and interface details.
- Dynamic Routing enabled route policy modes: Advanced Routing and Simple RIP Advertisement
- Setup Guide panel for configuring firewall as default gateway: LAN Settings
- Load Balancing/Failover method for outbound traffic distribution: Ratio-based
- Requirements for WAN ISP Failover and Load balancing: A second ISP connection and Placing each WAN on separate subnets
- Functionality of WAN Failover solution: Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and Directing redundant routes to one or more secondary service providers
- Event Log message generation for dropped packets: Action for the policy is set to reset/drop
- Certificate store for certificate installation: Trusted Root Certification Authorities
- SonicOS navigation path for VPN configuration: Manage>Connectivity>VPN
- Object type for VPN host configuration in Site-to-site VPN: Network Address Object
- Default encryption method for IKE phases in VPN configuration: SHA1
- Feature for global VPN client deployment: Group VPN Policies
- LDAP server role in user authorization: Active Directory Membership
- Security Services using SonicWall Deep Packet Inspection engine: IPS, GAV, and Anti-Spyware
- SonicWall Advanced Threat Protection features: Deep Packet Inspection and Geo-IP
- Required enablement for SonicWall Deep Packet Inspection engine protection: Zones and Security Services
- Packet Monitor packet status types: Forwarded and Consumed
- Option for saving Capture Buffer data when full: Wrap Capture Buffer once Full
- Diagnostic tool for MySonicWall server connectivity: Check Network Settings
- Options for preempting an administrator log-in: Change to read-only access and Dropped to Non-Config mode
- Policy types in App Rule Quick Configuration wizard: FTP Data Transfer and SMTP Client
- DHCP server information distribution to network clients: Gateway Address, IP Address and DNS Server Settings
- Web proxy server placement: DMZ or WAN zones.
- Supported DDNS providers in SonicOS: dyn.com, no-IP.com and changeip.com
- Predefined zones in SonicOS: VPN and LAN
- Sub-interface functionality in SonicWall firewall: VLAN support
- DNS server configuration tasks: Signature Downloads and CFS server name resolution
- SonicOS navigation path for User Authentication method configuration: Manage>Users>Settings
- Recommended authentication method for limited users: Local Users
- Built-in user groups in a Sonicwall firewall: Trusted Users, Everyone and Sonicwall Administrators
- User for Guest Account and Sessions management: Guest Administrators
- Predefined Schemas for LDAP configuration: Novel eDirectory and MS Active Directory
- Variables for static route configuration: Zones and Services
- Static route precedence over VPN traffic: True
- Feature for predefined email notification creation: Automation
- Log setting for changing event attributes globally: Configure Log
- Protocol Monitor information: Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate and Ingress/Egress TCP Rate
- SonicWall global IPS and Anti-Spyware attack threat management methods: Prevent All and Detect All
- SonicWall outbound failover mechanisms: Round Robin and Spillover-Based Ratio
- SonicOS navigation path for Advanced App Control settings: Manage>Policies>Rules>App Control> App Control Advanced
- Best practices for App Control configuration: Enable logging, as needed, per application and Assign common access rules to all users, regardless of groups
- Feature for implementing role-based security management: Single Sign-On
- Security Configuration menu option for enabling client DPI-SSL: Manage>Decryption Service>DPI-SSL/TLS Client
- DPI-SSL support: TLS 1.2 Protocol
- SonicOS navigation path for SSL-VPN configuration: Manage>Connectivity>SSL-VPN
- Policy type for Route-based VPN security policy: Tunnel Interface
- Required service for Capture ATP: AntiVirus
- Address Object types: Network, Range and Host
- Virtual interface functionality: Functional segregation of business operations
- Export formats for Packet Monitor output snapshot: Plain Text, HTML and Pcap
- Network probe result display locations: Client Computers, System Logs and Network Probes panel
- Packet Monitor result field for captured packet egress interface: Egress
- Appliance Health panel information: Bandwidth Monitor, Live Monitor and Protocol Monitor
- SonicOS management interface tab for visualization Dashboard: Monitor
- Number of active connections display in Connection monitor: Connection Count
- Default Event Log Filters: Category and Priority
- Default Event Log categories in a SonicWall firewall: System, Security Services and Firewall Settings
- Mechanism for routing loop prevention: Split Horizon
- Policy-Based Routing traffic routing based on: User-defined variables
- Single Sign-On (SSO) authentication options in a Sonicwall firewall: LDAP Authentication
- Location for adding Guest Services profile in SonicOS: Manage>Users>Guest Services
- Advanced interface setting for packet passage through other interfaces: Asymetric Routing
- ARP functionality: IP Addresses to MAC Addresses mapping
- Default local network resource for VPN connection: Firewalled Subnets
- Setup feature requiring string password setting: Allow HTTPS on this WAN interface
- SonicOS management interface panel for password restriction definition: Manage>Appliance>Base settings>Login Security
- Methods for SonicWall appliance registration: Using the getting Started Guide and From MySonicWall.com
- Displayed alert types with Logging Level filter set to Error: Critial, Alert and Emergency
- Default server types in Public Server wizard: Citrix ICA Server, Mail Server and Web Server
- Consequences of modifying LAN>WAN Access Rule to Deny: LAN user cannot access the Internet, but the appliance can still register with MySonicWall.com and update the UTM signatures.
- Filtering option excluding lower priority events: Logging Level
- User variables for static route configuration: The default Gateway, Metrics and Source and Destination Addresses
- System schedule options in SonicOS: Once, Recurring and Mixed
- Option to be unchecked when using Stateful HA: Enable Preempt Mode
- Intermediate traffic monitored by Packet Monitor: Encrypted Packets, Multicast packets that are replicates and IP Helper-generated packets
- Threat Protection panel information: Spyware blocked, virusses blocked and Intrusions prevented
- Enabling dynamic OSF routing on the SonicWall firewall: Change the routing mode to Advanced Routing on the Settings tab
- DPI-SSL SSL traffic examination: Regardless of the port number.
- SonicOS navigation path for HA configuration: Manage>High Availability> Base Setup
- DPI-SLL setting for bypassing decryption when connection limit is crossed: Allow SSL without decryption (bypass) when connection limit exceeded
- Navigation path for Failover and Load Balancing configuration in SonicOS: Manage>Network>Failover & Load Balancing
- Object type representing App Rule policy conditions: Math Object
- Location for enabling and configuring real-time data collection: Manage>Appflow Reporting>Settings
- Real-time data viewable in AppFlow logs: Users and Applications
- User group with Bookmark configuration access: SSL-VPN Users
- Public Server guide automatic server zone assignment based on IP address: False
- Certificate store for installing a certificate: Trusted Root Certification Authorities
- Default encryption method for both IKE phases when configuring a VPN: SHA1
- Predefined zones in SonicOS: VPN and LAN
- Navigation path to configure failover and load balancing in SonicOS: Manage > Network > Failover & Load Balancing
- HA interface tab used to define the mode for the primary firewall: Manage > High Availability > Base Setup
- Supported protocols by DPI-SSL: TLS 1.2 protocol
- Best practice for App Control configuration: Enable logging, as needed, per application
- SonicWall navigation path for SSL-VPN configuration: Manage > Connectivity > SSL-VPN
- SonicWall navigation path for advanced app control configuration: Manage > Policies > Rules > App Control > App Control Advanced
- SonicWall Navigation path for configuring the VPN on the firewall: Manage > Connectivity > VPN
- Address object types: Network, range, and host
- Default interface settings in SonicWall for connecting with the VPN: Firewalled subnets
- Type of certificate store that can be used to install a certificate: Trusted Root Certification Authorities
- SonicWall outbound failover mechanisms: Round Robin and Spillover-based ratio
- SonicWall Advanced Threat Protection features: Deep Packet Inspection and Geo-IP
- The logs panel that depicts the Eicar test virus file download: AppFlow Logs
- SonicWall navigation path for configuring the SSL-VPN on the firewall: Manage > Connectivity > SSL-VPN
- SonicWall navigation path for configuring the User Authentication method in SonicOS: Manage > Users > Settings
- Default Event Log Filters: Category and priority
- Which option is a common mechanism for preventing routing loops? Split Horizon
- Which of the following is a user variable defined to forward traffic in static route configuration? Metrics.
- Where is the real-time data collection enabled and configured from in the SonicOS management interface? Manage > AppFlow Reporting > Settings.
- Which of the following are the SonicWall outbound failover mechanisms? Round Robin and Spillover-based ratio.
- What feature allows you to implement transparent role-based security management? Implementing Single Sign-On.
- Which panel of the SonicOS management interface is used to define password restrictions? Manage > Appliance > Base Settings > Login Security.
- What type of information is displayed on the Appliance Health panel? Bandwidth Monitor, Live Monitor, and Protocol Monitor.
- Where do you add a Guest Services profile in SonicOS? Manage > Users > Guest Services.
- What are two route policy modes that are enabled by Dynamic Routing? Advanced Routing and Simple RIP Advertisement.
- Which of the following are required for WAN ISP Failover and Load Balancing? A second ISP connection and placing each WAN on separate subnets.
- What does a WAN Failover solution enable? Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and directing redundant routes to one or more secondary service providers.
- Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway? LAN Settings.
- Which of the following will enable you to implement transparent role-based security management? Implementing Single Sign-On.
- What type of information is displayed on the Live Monitor panel? Multi-Core Monitor and Connection Count.
- Which of the following Address Object types is selected by default in the firewall? Host.
- Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? BWM.
- What are two probe methods that are enabled by the logical probes feature? Ping and TCP.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.