Which of the following is a viable consideration when determining Rule Base order?
Which of the following is a viable consideration when determining Rule Base order?
You would use the Hide Rule feature to:
You would use the Hide Rule feature to:
Which of the following is a possible cause?
You are a Security Administrator using one Security Management Server managing three different
firewalls. One firewall does NOT show up in the dialog box when attempting to install a Security
Policy. Which of the following is a possible cause?
Which of the following would work BEST for your purpose?
Your shipping company uses a custom application to update the shipping distribution database.
The custom application includes a service used only to notify remote sites that the distribution
database is malfunctioning. The perimeter Security Gateway’s Rule Base includes a rule to accept
this traffic. Since you are responsible for multiple sites, you want notification by a text message to
your cellular phone, whenever traffic is accepted on this rule. Which of the following would work
BEST for your purpose?
What should you look for?
A client has created a new Gateway object that will be managed at a remote location. When the
client attempts to install the Security Policy to the new Gateway object, the object does not appear
in the Install On check box. What should you look for?
Which of the following change is the most likely cause of the block?
A Security Policy installed by another Security Administrator has blocked all SmartDashboard
connections to the stand-alone installation of R77. After running the command fw unloadlocal, you
are able to reconnect with SmartDashboard and view all changes. Which of the following change
is the most likely cause of the block?
which of the following is NOT a valid R77 topology configuration?
When configuring anti-spoofing on the Security Gateway object interfaces, which of the following is
NOT a valid R77 topology configuration?
Which of the following is the most likely cause?
You are conducting a security audit. While reviewing configuration files and logs, you notice logs
accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of
the following is the most likely cause?
Which rule is responsible for the installation failure?
Which rule is responsible for the installation failure?
Exhibit:
Exhibit: Exhibit:
Reviewing the Rule Base, you see that ________ is responsible for the client authentication
failure.
Exhibit:
Exhibit: