quiz 2
107 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are two probe methods that you can use for logical probes? (Select all that apply)

  • Ping (correct)
  • TCP (correct)
  • Which action object is used to throttle the traffic?

    BWM

    Which of the following Address Object types is selected by default in the firewall?

    Host

    Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?

    <p>Packet Monitor</p> Signup and view all the answers

    Where is the real-time data on the Dashboard compiled and summarized from?

    <p>AppFlow</p> Signup and view all the answers

    What type of information is displayed on the Live Monitor panel? (Select all that apply)

    <p>Connection Count</p> Signup and view all the answers

    Which file types can be used to export the logs? (Select all that apply)

    <p>CSV</p> Signup and view all the answers

    What is the default timeout setting for administrator inactivity?

    <p>5 Minutes</p> Signup and view all the answers

    What type of encoding format is supported when importing an end-user certificate with a private key?

    <p>PKCS#12</p> Signup and view all the answers

    Which SonicOS GUI option is used to create a snapshot of the current system state?

    <p>Create Backup</p> Signup and view all the answers

    Which interface is used by SonicOS as the backup heartbeat link?

    <p>X3</p> Signup and view all the answers

    The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.

    <p>True</p> Signup and view all the answers

    Which setting is used to turn on the CFS Security Service?

    <p>Enable Content Filtering Service</p> Signup and view all the answers

    Which Security Configuration menu option is used to enable client DPI-SSL?

    <p>Decryption Services</p> Signup and view all the answers

    Which Match Object will control what type of policy it can be used in?

    <p>Match object type</p> Signup and view all the answers

    What are the key components of a CFS policy? (Select all that apply)

    <p>Bandwidth Management</p> Signup and view all the answers

    Which Logs panel depicts the Eicar test virus file download?

    <p>AppFlow Logs</p> Signup and view all the answers

    A Site-to-Site VPN can allow simultaneous access to multiple remote servers.

    <p>True</p> Signup and view all the answers

    Which statement about SonicWall Gateway Anti-Virus service is correct?

    <p>Scans TCP stream-based protocols, in addition to common Web and email protocols</p> Signup and view all the answers

    Which of the following sentences is correct about HA configuration?

    <p>High Availability cannot be configured while there are ports participating in PortShield</p> Signup and view all the answers

    What type of NAT policies does a Public Server wizard create?

    <p>Inbound, Outbound, and Loopback NAT Policies</p> Signup and view all the answers

    Which of the following are included in the output of a network probe? (Select all that apply)

    <p>Interface Details</p> Signup and view all the answers

    What are two route policy modes that are enabled by Dynamic Routing?

    <p>Advanced Routing and Simple RIP Advertisement</p> Signup and view all the answers

    Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?

    <p>LAN Settings</p> Signup and view all the answers

    Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?

    <p>Ratio based</p> Signup and view all the answers

    Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)

    <p>A second ISP connection</p> Signup and view all the answers

    What does a WAN Failover solution enable? (Select all that apply)

    <p>Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port</p> Signup and view all the answers

    In the Event Logs, which of the following will generate a log message for any dropped packets?

    <p>The action for the policy is set to reset/drop</p> Signup and view all the answers

    What type of certificate store can be used to install the certificate?

    <p>Trusted Root Certification Authorities</p> Signup and view all the answers

    What is the SonicOS navigation path to begin configuring the VPN on the firewall?

    <p>Manage&gt;Connectivity&gt;VPN</p> Signup and view all the answers

    What type of object is created to configure a VPN host when implementing a Site-to-site VPN?

    <p>Network Address Object</p> Signup and view all the answers

    What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?

    <p>SHA1</p> Signup and view all the answers

    Which feature facilitates the setup and deployment of multiple global VPN clients?

    <p>Group VPN Policies</p> Signup and view all the answers

    What does the LDAP server provide to allow or deny user authorization?

    <p>Active Directory Membership</p> Signup and view all the answers

    Which group of Security Services uses the SonicWall Deep Packet Inspection engine?

    <p>IPS, GAV, and Anti-Spyware</p> Signup and view all the answers

    Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)

    <p>Deep Packet Inspection</p> Signup and view all the answers

    In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)

    <p>Security Services</p> Signup and view all the answers

    Which packet status types are indicated by the Packet Monitor? (Select all that apply)

    <p>Consumed</p> Signup and view all the answers

    Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?

    <p>Wrap Capture Buffer once Full</p> Signup and view all the answers

    Which diagnostic tool tests for MySonicWall server connectivity?

    <p>Check Network Settings</p> Signup and view all the answers

    What options are used to preempt an administrator logged into the firewall? (Select all that apply)

    <p>Change to read-only access</p> Signup and view all the answers

    Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)

    <p>SMTP Client</p> Signup and view all the answers

    What type of information does the DHCP server help distribute to network clients? (Select all that apply)

    <p>Gateway Address</p> Signup and view all the answers

    When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.

    <p>True</p> Signup and view all the answers

    Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)

    <p>changeip.com</p> Signup and view all the answers

    Which of the following are predefined zones in SonicOS? (Select all that apply)

    <p>LAN</p> Signup and view all the answers

    Sub-interfaces on the SonicWall firewall add support for VLANs.

    <p>True</p> Signup and view all the answers

    Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)

    <p>Signature Downloads</p> Signup and view all the answers

    Where do you configure the User Authentication method in SonicOS?

    <p>Manage&gt;Users&gt;Settings</p> Signup and view all the answers

    Which authentication method is recommended for a relatively small and limited number of users?

    <p>Local Users</p> Signup and view all the answers

    Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)

    <p>Trusted Users</p> Signup and view all the answers

    Who among the following can manage Guest Accounts and Sessions?

    <p>Guest Administrators</p> Signup and view all the answers

    Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)

    <p>MS Active Directory</p> Signup and view all the answers

    Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)

    <p>Zones</p> Signup and view all the answers

    Static routes, by default, take precedence over VPN traffic.

    <p>True</p> Signup and view all the answers

    Which feature is used to create a predefined email notification with a defined subject?

    <p>Automation</p> Signup and view all the answers

    Which log setting is used to change event attributes globally, using flexible match conditions?

    <p>Go to Configure Log</p> Signup and view all the answers

    What type of information is displayed on the Protocol Monitor? (Select all that apply)

    <p>Ingress/Egress TCP Rate</p> Signup and view all the answers

    Choose two methods that SonicWall provides for managing global IPS and Anti-Spyware attack threats. (Select all that apply)

    <p>Detect All</p> Signup and view all the answers

    Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)

    <p>Round Robin</p> Signup and view all the answers

    What is the navigation path to configuring the Advanced App Control settings in SonicOS?

    <p>Manage&gt;Policies&gt;Rules&gt;App Control&gt; App Control Advanced</p> Signup and view all the answers

    Identify the best practices that are related to configuring App Control. (Select all that apply)

    <p>Assign common access rules to all users, regardless of groups.</p> Signup and view all the answers

    Which of the following will enable you to implement transparent role-based security management?

    <p>Implementing Single Sign-On</p> Signup and view all the answers

    Which Security Configuration menu option is used to enable client DPI-SSL?

    <p>Manage&gt;Decryption Service&gt;DPI-SSL/TLS Client</p> Signup and view all the answers

    Which of the following are supported by DPI-SSL? (Select all that apply)

    <p>TLS 1.2 Protocol</p> Signup and view all the answers

    What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?

    <p>Manage&gt;Connectivity&gt;SSL-VPN</p> Signup and view all the answers

    Which policy type is selected when configuring the security policy of a Route-based VPN?

    <p>Tunnel Interface</p> Signup and view all the answers

    Which of the following services must be enabled to use Capture ATP?

    <p>AntiVirus</p> Signup and view all the answers

    Which of the following are Address Object types? (Select all that apply)

    <p>Range</p> Signup and view all the answers

    What do virtual interfaces enable?

    <p>Functional segregation of business operations</p> Signup and view all the answers

    In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)

    <p>HTML</p> Signup and view all the answers

    Where are the results of network probes displayed? (Select all that apply)

    <p>System Logs</p> Signup and view all the answers

    Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?

    <p>Egress</p> Signup and view all the answers

    What type of information is displayed on the Appliance Health panel? (Select all that apply)

    <p>Bandwidth Monitor</p> Signup and view all the answers

    Which tab on the SonicOS management interface displays the visualization Dashboard?

    <p>Monitor</p> Signup and view all the answers

    Which Connection Monitor depicts the number of active connections?

    <p>Connection Count</p> Signup and view all the answers

    Which of the following are default Event Log Filters? (Select all that apply)

    <p>Priority</p> Signup and view all the answers

    Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)

    <p>Firewall Settings</p> Signup and view all the answers

    Which option is a common mechanism for preventing routing loops?

    <p>Split Horizon</p> Signup and view all the answers

    Policy-Based Routing routes traffic based on various user-defined variable.

    <p>True</p> Signup and view all the answers

    Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?

    <p>LDAP Authentication</p> Signup and view all the answers

    Where do you add a Guest Services profile in SonicOS?

    <p>Manage&gt;Users&gt;Guest Services</p> Signup and view all the answers

    Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?

    <p>Asymmetric Routing</p> Signup and view all the answers

    What types of mapping does ARP enable?

    <p>IP Addresses to MAC Addresses</p> Signup and view all the answers

    Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?

    <p>Firewalled Subnets</p> Signup and view all the answers

    Which setup feature also requires a string password setting to avoid potential security vulnerabilities?

    <p>Allow HTTPS on this WAN interface</p> Signup and view all the answers

    Which panel of the SonicOS management interface is used to define password restrictions?

    <p>Manage&gt;Appliance&gt;Base settings&gt;Login Security</p> Signup and view all the answers

    Select the two methods you can use to register the SonicWall appliance. (Select all that apply)

    <p>From MySonicWall.com</p> Signup and view all the answers

    If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)

    <p>Critical</p> Signup and view all the answers

    Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)

    <p>Citrix ICA Server</p> Signup and view all the answers

    SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny' blocking all outbound WAN traffic. Which of the following statements is applicable in this context?

    <p>LAN user cannot access the Internet, but the appliance can still register with MySonicWall.com and update the UTM signatures.</p> Signup and view all the answers

    Which Filtering option allows you to exclude events at lower priority?

    <p>Logging Level</p> Signup and view all the answers

    Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)

    <p>Source and Destination Addresses</p> Signup and view all the answers

    What type of system schedule options can be defined in SonicOS? (Select all that apply)

    <p>Mixed</p> Signup and view all the answers

    Which option is recommended to be left unchecked when using Stateful HA?

    <p>Enable Preempt Mode</p> Signup and view all the answers

    What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)

    <p>Multicast packets that are replicates</p> Signup and view all the answers

    What type of information is displayed on the Threat Protection panel? (Select all that apply)

    <p>Viruses blocked</p> Signup and view all the answers

    How do you enable dynamic OSF routing on the SonicWall firewall?

    <p>Change the routing mode to Advanced Routing on the Settings tab</p> Signup and view all the answers

    DPI-SSL examines SSL traffic, regardless of the port number.

    <p>True</p> Signup and view all the answers

    Where is the HA interfaces tab used to define the mode for the primary firewall? What is the SonicOS navigation path for HA configuration?

    <p>Manage&gt;High Availability&gt;Base Setup</p> Signup and view all the answers

    Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?

    <p>Allow SSL without decryption (bypass) when connection limit exceeded</p> Signup and view all the answers

    What is the navigation path to configure Failover and Load Balancing in SonicOS?

    <p>Manage&gt;Network&gt;Failover &amp; Load Balancing</p> Signup and view all the answers

    Which object type represents the conditions that must be met in an App Rule policy?

    <p>Match Object</p> Signup and view all the answers

    Where is the real-time data collection enabled and configured from in the SonicOS management interface?

    <p>Manage&gt;Appflow Reporting&gt;Settings</p> Signup and view all the answers

    What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)

    <p>Applications</p> Signup and view all the answers

    Which user group can have Bookmarks configured for them?

    <p>SSL-VPN Users</p> Signup and view all the answers

    The Public Server guide assigns the server automatically to the zone to which its IP address belongs.

    <p>False</p> Signup and view all the answers

    Study Notes

    SonicWall Firewall

    • Probe methods for logical probes: Ping and TCP
    • Action object for traffic throttling: BWM
    • Default Address Object type in firewall: Host
    • Diagnostic utility for packet inspection: Packet Monitor
    • Real-time data source for Dashboard: AppFlow
    • Live Monitor panel displays: Multi-Core Monitor and Connection Count
    • Log export file types: Email and CSV
    • Default administrator inactivity timeout: 5 minutes
    • Encoding format for end-user certificate import: PKCS#12
    • GUI option for system snapshot: Create Backup
    • Backup heartbeat link interface: X3
    • Firewall snapshot displays encrypted traffic percentage: True
    • Setting to activate CFS Security Service: Enable Content Filtering Service
    • Security Configuration menu option for client DPI-SSL: Decryption Services
    • Match object type determines: Policy type
    • Key components of CFS policy: Bandwidth Management, authenticate and block
    • Logs panel displaying Eicar test virus file download: AppFlow Logs
    • Site-to-Site VPN allows simultaneous access to multiple remote servers: True
    • SonicWall Gateway Anti-Virus service functionality: Scans TCP stream-based protocols, in addition to common Web and email protocols
    • HA configuration restriction: Cannot be configured while PortShield is active
    • Public Server wizard NAT policy types: Inbound, Outbound, and Loopback NAT Policies
    • Network probe output: IP addressing, probe target and type, and interface details.
    • Dynamic Routing enabled route policy modes: Advanced Routing and Simple RIP Advertisement
    • Setup Guide panel for configuring firewall as default gateway: LAN Settings
    • Load Balancing/Failover method for outbound traffic distribution: Ratio-based
    • Requirements for WAN ISP Failover and Load balancing: A second ISP connection and Placing each WAN on separate subnets
    • Functionality of WAN Failover solution: Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and Directing redundant routes to one or more secondary service providers
    • Event Log message generation for dropped packets: Action for the policy is set to reset/drop
    • Certificate store for certificate installation: Trusted Root Certification Authorities
    • SonicOS navigation path for VPN configuration: Manage>Connectivity>VPN
    • Object type for VPN host configuration in Site-to-site VPN: Network Address Object
    • Default encryption method for IKE phases in VPN configuration: SHA1
    • Feature for global VPN client deployment: Group VPN Policies
    • LDAP server role in user authorization: Active Directory Membership
    • Security Services using SonicWall Deep Packet Inspection engine: IPS, GAV, and Anti-Spyware
    • SonicWall Advanced Threat Protection features: Deep Packet Inspection and Geo-IP
    • Required enablement for SonicWall Deep Packet Inspection engine protection: Zones and Security Services
    • Packet Monitor packet status types: Forwarded and Consumed
    • Option for saving Capture Buffer data when full: Wrap Capture Buffer once Full
    • Diagnostic tool for MySonicWall server connectivity: Check Network Settings
    • Options for preempting an administrator log-in: Change to read-only access and Dropped to Non-Config mode
    • Policy types in App Rule Quick Configuration wizard: FTP Data Transfer and SMTP Client
    • DHCP server information distribution to network clients: Gateway Address, IP Address and DNS Server Settings
    • Web proxy server placement: DMZ or WAN zones.
    • Supported DDNS providers in SonicOS: dyn.com, no-IP.com and changeip.com
    • Predefined zones in SonicOS: VPN and LAN
    • Sub-interface functionality in SonicWall firewall: VLAN support
    • DNS server configuration tasks: Signature Downloads and CFS server name resolution
    • SonicOS navigation path for User Authentication method configuration: Manage>Users>Settings
    • Recommended authentication method for limited users: Local Users
    • Built-in user groups in a Sonicwall firewall: Trusted Users, Everyone and Sonicwall Administrators
    • User for Guest Account and Sessions management: Guest Administrators
    • Predefined Schemas for LDAP configuration: Novel eDirectory and MS Active Directory
    • Variables for static route configuration: Zones and Services
    • Static route precedence over VPN traffic: True
    • Feature for predefined email notification creation: Automation
    • Log setting for changing event attributes globally: Configure Log
    • Protocol Monitor information: Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate and Ingress/Egress TCP Rate
    • SonicWall global IPS and Anti-Spyware attack threat management methods: Prevent All and Detect All
    • SonicWall outbound failover mechanisms: Round Robin and Spillover-Based Ratio
    • SonicOS navigation path for Advanced App Control settings: Manage>Policies>Rules>App Control> App Control Advanced
    • Best practices for App Control configuration: Enable logging, as needed, per application and Assign common access rules to all users, regardless of groups
    • Feature for implementing role-based security management: Single Sign-On
    • Security Configuration menu option for enabling client DPI-SSL: Manage>Decryption Service>DPI-SSL/TLS Client
    • DPI-SSL support: TLS 1.2 Protocol
    • SonicOS navigation path for SSL-VPN configuration: Manage>Connectivity>SSL-VPN
    • Policy type for Route-based VPN security policy: Tunnel Interface
    • Required service for Capture ATP: AntiVirus
    • Address Object types: Network, Range and Host
    • Virtual interface functionality: Functional segregation of business operations
    • Export formats for Packet Monitor output snapshot: Plain Text, HTML and Pcap
    • Network probe result display locations: Client Computers, System Logs and Network Probes panel
    • Packet Monitor result field for captured packet egress interface: Egress
    • Appliance Health panel information: Bandwidth Monitor, Live Monitor and Protocol Monitor
    • SonicOS management interface tab for visualization Dashboard: Monitor
    • Number of active connections display in Connection monitor: Connection Count
    • Default Event Log Filters: Category and Priority
    • Default Event Log categories in a SonicWall firewall: System, Security Services and Firewall Settings
    • Mechanism for routing loop prevention: Split Horizon
    • Policy-Based Routing traffic routing based on: User-defined variables
    • Single Sign-On (SSO) authentication options in a Sonicwall firewall: LDAP Authentication
    • Location for adding Guest Services profile in SonicOS: Manage>Users>Guest Services
    • Advanced interface setting for packet passage through other interfaces: Asymetric Routing
    • ARP functionality: IP Addresses to MAC Addresses mapping
    • Default local network resource for VPN connection: Firewalled Subnets
    • Setup feature requiring string password setting: Allow HTTPS on this WAN interface
    • SonicOS management interface panel for password restriction definition: Manage>Appliance>Base settings>Login Security
    • Methods for SonicWall appliance registration: Using the getting Started Guide and From MySonicWall.com
    • Displayed alert types with Logging Level filter set to Error: Critial, Alert and Emergency
    • Default server types in Public Server wizard: Citrix ICA Server, Mail Server and Web Server
    • Consequences of modifying LAN>WAN Access Rule to Deny: LAN user cannot access the Internet, but the appliance can still register with MySonicWall.com and update the UTM signatures.
    • Filtering option excluding lower priority events: Logging Level
    • User variables for static route configuration: The default Gateway, Metrics and Source and Destination Addresses
    • System schedule options in SonicOS: Once, Recurring and Mixed
    • Option to be unchecked when using Stateful HA: Enable Preempt Mode
    • Intermediate traffic monitored by Packet Monitor: Encrypted Packets, Multicast packets that are replicates and IP Helper-generated packets
    • Threat Protection panel information: Spyware blocked, virusses blocked and Intrusions prevented
    • Enabling dynamic OSF routing on the SonicWall firewall: Change the routing mode to Advanced Routing on the Settings tab
    • DPI-SSL SSL traffic examination: Regardless of the port number.
    • SonicOS navigation path for HA configuration: Manage>High Availability> Base Setup
    • DPI-SLL setting for bypassing decryption when connection limit is crossed: Allow SSL without decryption (bypass) when connection limit exceeded
    • Navigation path for Failover and Load Balancing configuration in SonicOS: Manage>Network>Failover & Load Balancing
    • Object type representing App Rule policy conditions: Math Object
    • Location for enabling and configuring real-time data collection: Manage>Appflow Reporting>Settings
    • Real-time data viewable in AppFlow logs: Users and Applications
    • User group with Bookmark configuration access: SSL-VPN Users
    • Public Server guide automatic server zone assignment based on IP address: False
    • Certificate store for installing a certificate: Trusted Root Certification Authorities
    • Default encryption method for both IKE phases when configuring a VPN: SHA1
    • Predefined zones in SonicOS: VPN and LAN
    • Navigation path to configure failover and load balancing in SonicOS: Manage > Network > Failover & Load Balancing
    • HA interface tab used to define the mode for the primary firewall: Manage > High Availability > Base Setup
    • Supported protocols by DPI-SSL: TLS 1.2 protocol
    • Best practice for App Control configuration: Enable logging, as needed, per application
    • SonicWall navigation path for SSL-VPN configuration: Manage > Connectivity > SSL-VPN
    • SonicWall navigation path for advanced app control configuration: Manage > Policies > Rules > App Control > App Control Advanced
    • SonicWall Navigation path for configuring the VPN on the firewall: Manage > Connectivity > VPN
    • Address object types: Network, range, and host
    • Default interface settings in SonicWall for connecting with the VPN: Firewalled subnets
    • Type of certificate store that can be used to install a certificate: Trusted Root Certification Authorities
    • SonicWall outbound failover mechanisms: Round Robin and Spillover-based ratio
    • SonicWall Advanced Threat Protection features: Deep Packet Inspection and Geo-IP
    • The logs panel that depicts the Eicar test virus file download: AppFlow Logs
    • SonicWall navigation path for configuring the SSL-VPN on the firewall: Manage > Connectivity > SSL-VPN
    • SonicWall navigation path for configuring the User Authentication method in SonicOS: Manage > Users > Settings
    • Default Event Log Filters: Category and priority
    • Which option is a common mechanism for preventing routing loops? Split Horizon
    • Which of the following is a user variable defined to forward traffic in static route configuration? Metrics.
    • Where is the real-time data collection enabled and configured from in the SonicOS management interface? Manage > AppFlow Reporting > Settings.
    • Which of the following are the SonicWall outbound failover mechanisms? Round Robin and Spillover-based ratio.
    • What feature allows you to implement transparent role-based security management? Implementing Single Sign-On.
    • Which panel of the SonicOS management interface is used to define password restrictions? Manage > Appliance > Base Settings > Login Security.
    • What type of information is displayed on the Appliance Health panel? Bandwidth Monitor, Live Monitor, and Protocol Monitor.
    • Where do you add a Guest Services profile in SonicOS? Manage > Users > Guest Services.
    • What are two route policy modes that are enabled by Dynamic Routing? Advanced Routing and Simple RIP Advertisement.
    • Which of the following are required for WAN ISP Failover and Load Balancing? A second ISP connection and placing each WAN on separate subnets.
    • What does a WAN Failover solution enable? Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and directing redundant routes to one or more secondary service providers.
    • Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway? LAN Settings.
    • Which of the following will enable you to implement transparent role-based security management? Implementing Single Sign-On.
    • What type of information is displayed on the Live Monitor panel? Multi-Core Monitor and Connection Count.
    • Which of the following Address Object types is selected by default in the firewall? Host.
    • Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? BWM.
    • What are two probe methods that are enabled by the logical probes feature? Ping and TCP.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Use Quizgecko on...
    Browser
    Browser