Which of the following is a possible cause?
Robert has configured a Common Internet File System (CIFS) resource to allow access to the
public partition of his company’s file server, on \\erisco\goldenapple\files\public. Robert receives
reports that users are unable to access the shared partition, unless they use the file server’s IP
address. Which of the following is a possible cause?
Which type of address translation should you use, to ensure the two networks access each other through the VPN
You want to create an IKE VPN between two VPN-1 NGX Security Gateways, to protect two
networks. The network behind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind
the peer’s Gateway. Which type of address translation should you use, to ensure the two networks
access each other through the VPN tunnel?
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping J
Which is the BEST configuration option to protect internal users from malicious Java code, without
stripping Java scripts?
What is the correct order of steps?
Your VPN Community includes three Security Gateways. Each Gateway has its own internal
network defined as a VPN Domain. You must test the VPN-1 NGX routE. based VPN feature,
without stopping the VPN. What is the correct order of steps?
Which Security Server can perform authentication tasks, but CANNOT perform content security tasks?
Which Security Server can perform authentication tasks, but CANNOT perform content security
tasks?
what does this command allow you to upgrade?
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro
Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX
CD, what does this command allow you to upgrade?
Which type of service should a Security Administrator use in a Rule Base to control access to specific shared
Which type of service should a Security Administrator use in a Rule Base to control access to
specific shared partitions on target machines?
Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?
Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the
following options will end the intruder’s access, after the next Phase 2 exchange occurs?
How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_Ato end point Net_
How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_Ato end
point Net_B, through an NGX Security Gateway?