How can you do this?
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this
configuration. You then delete two existing users and add a new user group. You modify one rule and add two
new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you
decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do
this?
Choose the BEST reason why.
You find that Users are not prompted for authentication when they access their Web servers, even though you
have created an HTTP rule via User Authentication. Choose the BEST reason why.
Choose the correct statement regarding Implicit Rules.
Choose the correct statement regarding Implicit Rules.
Which of the following is the BEST explanation for this…
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through
your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although
the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE
traffic only shows one entry for the whole day (early in the morning after a Policy install).
Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-
minute interval.
If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive
packet every minute.
Which of the following is the BEST explanation for this behavior?
Which of the following authentication methods can be co…
Which of the following authentication methods can be configured in the Identity Awareness setup wizard?
Which of the below is the MOST correct process to reset…
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Which two SmartConsole applications will you use to cre…
You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas.
Management wants a report detailing the current software level of each Enterprise class Security Gateway. You
plan to take the opportunity to create a proposal outline, listing the most cost-effective way to upgrade your
Gateways. Which two SmartConsole applications will you use to create this report and outline?
A Cleanup rule:
A Cleanup rule:
what information is required to log into R77?
When launching SmartDashboard, what information is required to log into R77?
How do you achieve this?
You find a suspicious connection from a problematic host. You decide that you want to block everything from
that whole network, not just the problematic host. You want to block this for an hour while you investigate
further, but you do not want to add any rules to the Rule Base. How do you achieve this?