Which features are only supported with R81.10 Gateways but not R77.x?

Which features are only supported with R81.10 Gateways but not R77.x?
A . Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
D. Time object to a rule to make the rule active only during specified times.

Answer: C

What has to be taken into consideration when configuring Management HA?

What has to be taken into consideration when configuring Management HA?
A . The Database revisions will not be synchronized between the management servers
B. Smart Console must be closed prior to synchronized changes in the objects database
C. If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
D. For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Answer: A

Which method below is NOT one of the ways to communicate using the Management API’s?

Which method below is NOT one of the ways to communicate using the Management API’s?
A . Typing API commands using the “mgmt_cli” command
B. Typing API commands from a dialog box inside the SmartConsole GUI application
C. Typing API commands using Gaia’s secure shell(clish)19+
D. Sending API commands over an http connection using web-services

Answer: D

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
A . Block Port Overflow
B. Local Interface Spoofing
C. Suspicious Activity Monitoring
D. Adaptive Threat Prevention

Answer: C

Explanation:

Suspicious Activity Rules Solution

Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access privileges upon detection of any suspicious network activity (for example, several attempts to gain unauthorized access).

The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block suspicious connections that are not restricted by the currently enforced security policy. These rules, once set (usually with an expiration date), can be applied immediately without the need to perform an Install Policy operation.