Diffie-Hellman uses which type of key exchange?
Diffie-Hellman uses which type of key exchange?
What is the correct statement?
Amy is configuring a User Authentication rule for the technical-support department to access an intranet server. What is the correct statement?
What is the reason for the Critical Problem notification in this SmartView Monitor example?
What is the reason for the Critical Problem notification in this SmartView Monitor example?
Which encryption scheme would you select?
You are setting up a Virtual Private Network, and must select an encryption scheme. Your data is extremely business sensitive and you want maximum security for your data communications. Which encryption scheme would you select?
How do you achieve this?
When you find a suspicious connection from a problematic host, you want to block everything from that whole network, not just the host. You want to block this for an hour, but you do not want to add any rules to the Rule Base. How do you achieve this?
What is causing this?
William is a Security Administrator who has added address translation for his internal Web server to be accessible by external clients. Due to poor network design by his predecessor, William sets up manual NAT rules for this server, while his FTP server and SMTP server are both using automatic NAT rules. All traffic from his FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped because of anti-spoofing settings. What is causing this?
How are cached usernames and passwords cleared from the memory of an NGX Security Gateway?
How are cached usernames and passwords cleared from the memory of an NGX Security Gateway?
A digital signature:
A digital signature:
After importing the NGX schema into an LDAP server, what should you enable?
After importing the NGX schema into an LDAP server, what should you enable?
How is the port scan configured on the second Policy Package’s SmartDefense tab?
You create two Policy Packages for two NGX Security Gateways. For the first Policy Package, you selected Security and Address Translation and QoS Policy. For the second Policy Package, you selected Security and Address Translation and Desktop Security Policy. In the first Policy Package, you enabled host-based port scan from the SmartDefense tab. You save and install the policy to the relevant Gateway object. How is the port scan configured on the second Policy Package’s SmartDefense tab?