What are two probe methods that you.txt
Document Details
Uploaded by BeneficentCello
Tags
Full Transcript
What are two probe methods that you can use for logical probes? (select all that apply) - ANSWER-Ping and TCP Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? - ANSWER- BWM Which of th...
What are two probe methods that you can use for logical probes? (select all that apply) - ANSWER-Ping and TCP Action objects allow you to control how the category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? - ANSWER- BWM Which of the following Address Object types is selected by default in the firewall? - ANSWER-Host Which diagnostic utility on the SonicWall firewall allows you to lookat the contents of ip packets traversing the firewall? - ANSWER-Packet Monitor Where is the real-time data on the Dashboard compiled and summarized from? - ANSWER-AppFlow What type of information is displayed on the Live Monitor panel?(Select all that apply) - ANSWER-Multi-Core Monitor and Connection Count Which file types can be used to export the logs? (Select all that apply) - ANSWER-Email and CSV What is the default timeout setting for administrator inactivity? - ANSWER-5 Minutes What type of encoding format is supported when importing an end-user certificate with a private key? - ANSWER-PKCS#12 Which SonicOS GUI option is used to create a snapshot of the current system state? - ANSWER-Create Backup Which interface is used by SonicOS as the backup hearbeat link? - ANSWER-X3 The firewall snapshot section displays the percentage of encryted traffic flowing through the firewall. - ANSWER-True Which setting is used to turn on the CFS Security Service? - ANSWER-Enable Content Filtering Service Which Security Configuration menu option is used to enable client DPI-SSL? - ANSWER-Decryption Services Which Match Object will control what type of policy it can be used in? - ANSWER-Match object type What are the key components of a CFS policy?(Select all that apply) - ANSWERBandwidth Management, authenticate and block Which Logs panel depicts the Eicar test virus file download? - ANSWER-AppFlow Logs A Site-to-Site VPN can allow simultaneous access to multiples remote servers - ANSWER-True Which statement about SonicWall Gateway Anti-Virus service is correct? - ANSWERScans TCP stream18-based protocols, in addition to common Web and email protocols