What happens when a user from the internal network tries to browse to the Internet using HTTP?
Review the following rules. Assume domain UDP is enabled in the implied rules. exhibit What happens when a user from the internal network tries to browse to the Internet using HTTP? The:
When users access their Web servers, they are not prompted for authentication…
Anna has created an HTTP rule via User Authentication. When users access their Web servers, they are not prompted for authentication. Why?
which was created during initial installation of the SmartCenter Server on SecurePlatform?
How can you reset the password of the Security Administrator, which was created during initial installation of the SmartCenter Server on SecurePlatform?
Jack’s project is to define the backup and restore section of his organization’s disaster recovery
Jack’s project is to define the backup and restore section of his organization’s disaster recovery plan for his organization’s distributed NGX installation. Jack must meet the following required and desired objectives:
Required Objective: The security policy repository must be backed up no less frequently than every 24 hours.
Desired Objective: The NGX components that enforce the Security Policies should be backed up no less frequently than once a week.
Desired Objective: Back up NGX logs no less frequently than once a week.
Jack’s disaster recovery plan is as follows:
Use the cron utility to run the upgrade_export command each night on the SmartCenter Servers.
Configure the organization’s routine backup software to back up the files created by the upgrade_export command.
Configure the SecurePlatform backup utility to back up the Security Gateways every Saturday night.
Use the cron utility to run the upgrade_export command each Saturday night on the Log Servers.
Configure an automatic, nightly logswitch. Configure the organization’s routine backup software to back up the switched logs every night.
Jack’s plan:
what happens if you Ping from host 10.10.10.5 to a host on the Internet, by IP address?
You create implicit and explicit rules for the following network. The group object "internal-networks" includes networks 10.10.10.0 and 10.10.20.0. Assume "Accept ICMP
requests" is enabled as before last in the Global Properties.Based on these rules, exhibit what happens if you
Ping from host 10.10.10.5 to a host on the Internet, by IP address? ICMP will be:
Which NGX logs can you configure to send to DShield.org?
Which NGX logs can you configure to send to DShield.org?
how do you make the change effective?
When you change an implicit rule’s order from "last" to "first" in Global Properties, how do you make the change effective?
digital signatures are only used when implementing…
If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:
What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers’
Brianna has three servers located in a DMZ, using private IP addresses. She wants internal users from 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net
10.10.10.x is configured for Hide NAT behind the Security Gateway’s external interface.
exhibit What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers’ public IP addresses?
What can you do to keep old log files, when free space falls below 45 MB?
In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs. What can you do to keep old log files, when free space falls below 45 MB?