How could she use SmartView Monitor to find this information?
Amanda is compiling traffic statistics for her company’s Internet activity during production hours. How could she use SmartView Monitor to find this information? By:
Which of the following encryption modes causes the greatest increase in packet size?
Which of the following encryption modes causes the greatest increase in packet size?
Which of the following options is MOST appropriate for Ophelia’s requirement?
Ophelia is the Security Administrator for a shipping company. Her company uses a custom application to update the distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway’s Rule Base includes a rule to accept this traffic. Ophelia needs to be notified, via a text message to her cellular phone, whenever traffic is accepted on this rule. Which of the following options is MOST appropriate for Ophelia’s requirement?
Which backup-and-restore solution do you recommend for Jane?
Jane needs to back up the routing, interface, and DNS configuration information from her NGX SecurePlatform Pro Security Gateway. Which backup-and-restore solution do you recommend for Jane?
How can she resolve this problem, without causing other security issues?
A Security Administrator is notified that some long-lasting Telnet connections to a mainframe are dropped every time after an hour. The Administrator suspects that the Security Gateway might be blocking these connections. As she reviews the Smart Tracker the Administrator sees the packet is dropped with the error "Unknown established connection". How can she resolve this problem, without causing other security issues? Choose the BEST answer. She can:
When you hide a rule in a Rule Base, how can you then disable the rule?
When you hide a rule in a Rule Base, how can you then disable the rule?
When you check “Web Server” in a host-node object, what happens to the host?
When you check "Web Server" in a host-node object, what happens to the host?
Which SmartConsole application should Gail use to check these objects and rules?
Gail is the Security Administrator for a marketing firm. Gail is working with the networking team, to troubleshoot user complaints regarding access to audio-streaming material from the Internet. The networking team asks Gail to check the object and rule configuration settings for the perimeter Security Gateway. Which SmartConsole application should Gail use to check these objects and rules?
Which SmartConsole application should Alex use, to view the percent of free hard-disk space on the remote Secu
Alex is the Security Administrator for a large, geographically distributed network. The Internet connection at one of his remote sites failed during the weekend, and the Security Gateway logged locally for over 48 hours. Alex is concerned that the logs may have consumed most of the free space on the Gateway’s hard disk. Which SmartConsole application should Alex use, to view the percent of free hard-disk space on the remote Security Gateway?
Which of the following uses the same key to decrypt as it does to encrypt?
Which of the following uses the same key to decrypt as it does to encrypt?