Which of the following would be MOST effective for quickly dropping all connections from a specific attackerâ€
Your Security Gateways are running near performance capacity and will get upgraded hardware
next week. Which of the following would be MOST effective for quickly dropping all connections
from a specific attacker’s IP at a peak time of day?
Which of the following would be MOST effective for quickly dropping an attacker’s specific active connection
Your company enforces a strict change control policy. Which of the following would be MOST
effective for quickly dropping an attacker’s specific active connection?
______________ is an R77 component that displays the number of packets accepted, rejected, and dropped on a sp
______________ is an R77 component that displays the number of packets accepted, rejected,
and dropped on a specific Security Gateway, in real time.
What should you do to analyze the packet size distribution of your traffic?
You have just installed your Gateway and want to analyze the packet size distribution of your
traffic with SmartView Monitor.
Unfortunately, you get the message.
“There are no machines that contain Firewall Blade and SmartView Monitor.”
What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.
Where would you configure this alert?
You want to configure a mail alert for every time the policy is installed to a specific Gateway.
Where would you configure this alert?
Which of the following methods is BEST to accomplish this task?
Your boss wants you to closely monitor an employee suspected of transferring company secrets to
the competition. The IT department discovered the suspect installed a WinSCP client in order to
use encrypted communication. Which of the following methods is BEST to accomplish this task?
What additional steps are required for this to function correctly?
You install and deploy GAiA with default settings. You allow Visitor Mode in the Gateway object’s
Remote Access properties and install policy. What additional steps are required for this to function
correctly?
How do you solve this problem?
With deployment of SecureClient, you have defined in the policy that you allow traffic only to an
encrypted domain. But when your mobile users move outside of your company, they often cannot
use SecureClient because they have to register first (i.e. in Hotel or Conference rooms). How do
you solve this problem?
What statement is true regarding Visitor Mode?
What statement is true regarding Visitor Mode?
What is the probable cause of the error?
When attempting to connect with SecureClient Mobile you get the following error message:
The certificate provided is invalid. Please provide the username and password.
What is the probable cause of the error?