What are two probe methods that you.txt

Full Transcript

What are two probe methods that you can use for logical probes? (select all that apply) - ANSWER-Ping and TCP Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? - ANSWER- BWM Which of th...

What are two probe methods that you can use for logical probes? (select all that apply) - ANSWER-Ping and TCP Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? - ANSWER- BWM Which of the following Address Object types is selected by default in the firewall? - ANSWER-Host Which diagnostic utility on the SonicWall firewall allows you to lookat the contents of ip packets traversing the firewall? - ANSWER-Packet Monitor Where is the real-time data on the Dashboard compiled and summarized from? - ANSWER-AppFlow What type of information is displayed on the Live Monitor panel?(Select all that apply) - ANSWER-Multi-Core Monitor and Connection Count Which file types can be used to export the logs? (Select all that apply) - ANSWER-Email and CSV What is the default timeout setting for administrator inactivity? - ANSWER-5 Minutes What type of encoding format is supported when importing an end-user certificate with a private key? - ANSWER-PKCS#12 Which SonicOS GUI option is used to create a snapshot of the current system state? - ANSWER-Create Backup Which interface is used by SonicOS as the backup hearbeat link? - ANSWER-X3 The firewall snapshot section displays the percentage of encryted traffic flowing through the firewall. - ANSWER-True Which setting is used to turn on the CFS Security Service? - ANSWER-Enable Content Filtering Service Which Security Configuration menu option is used to enable client DPI-SSL? - ANSWER-Decryption Services Which Match Object will control what type of policy it can be used in? - ANSWER-Match object type What are the key components of a CFS policy?(Select all that apply) - ANSWERBandwidth Management, authenticate and block Which Logs panel depicts the Eicar test virus file download? - ANSWER-AppFlow Logs A Site-to-Site VPN can allow simultaneous access to multiples remote servers - ANSWER-True Which statement about SonicWall Gateway Anti-Virus service is correct? - ANSWERScans TCP stream18-based protocols, in addition to common Web and email protocols

Use Quizgecko on...
Browser
Browser