To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.)A . You can only send log messages to Dimension from a computer that is on the network behind your gateway Firebox.B . You must change the connection...
Continue readingWhat settings could you modify in the local device configuration to resolve this issue?
While troubleshooting a branch office VPN tunnel, you see this log message: 2014-07-23 12:29:15 iked (203.0.113.10<->203.0.113.20) Peer proposes phase one encryption 3DES, expecting AES What settings could you modify in the local device configuration to resolve this issue? (Select one.)A . BOVPN Gateway settingsB . BOVPN-Allow policiesC . BOVPN Tunnel settingsD . BOVPN Tunnel...
Continue readingWhich takes precedence: WebBlocker category match or a WebBlocker exception?
Which takes precedence: WebBlocker category match or a WebBlocker exception?A . WebBlocker exceptionB . WebBlocker category match View Answer Answer: B...
Continue readingIf you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use?
You have a privately addressed email server behind your Firebox. If you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use? (Select one.)A . In the SMTP policy that handles traffic...
Continue readingWhich of these threats can the Firebox prevent with the default packet handling settings? (Select four.)
Which of these threats can the Firebox prevent with the default packet handling settings? (Select four.)A . Access to inappropriate websitesB . Denial of service attacksC . Flood attacksD . Malware in downloaded filesE . Port scansF . Viruses in email messagesG . IP spoofing View Answer Answer: B,C,E,G...
Continue readingIn the network configuration in this image, which aliases is Eth2 a member of? (Select three.)
In the network configuration in this image, which aliases is Eth2 a member of? (Select three.) A . Any-optionalB . Any-ExternalC . Optional-1D . AnyE . Any-Trusted View Answer Answer: A,C,D...
Continue readingFrom the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them.
From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them.A . TrueB . False View Answer Answer: B...
Continue readingYou can configure your Firebox to automatically redirect users to the Authentication Portal page.
You can configure your Firebox to automatically redirect users to the Authentication Portal page.A . TrueB . False View Answer Answer: B...
Continue readingWhat option could you choose to make sure the newsletter is delivered to your users?
An email newsletter about sales from an external company is sometimes blocked by spamBlocker. What option could you choose to make sure the newsletter is delivered to your users? (Select one.)A . Add a spamBlocker exception based on the From field of the newsletter email.B . Set the spamBlocker action to quarantine the email...
Continue readingBased on the configuration shown in this image, what could be the problem with this policy configuration?
Users on the trusted network cannot browse Internet websites. Based on the configuration shown in this image, what could be the problem with this policy configuration? (Select one.)A . The default Outgoing policy has been removed and there is no policy to allow DNS traffic.B . The HTTP-proxy policy has higher precedence than the...
Continue reading