Which of the following is NOT true?
A SecureClient configuration is being verified with Secure Configuration Verification (SCV) on an
Enforcement Module. Which of the following is NOT true?
In the event that an unauthorized user attempts to compromise a valid SecureClient connection, the SecureClien
In the event that an unauthorized user attempts to compromise a valid SecureClient connection,
the SecureClient machine can remain protected by:
Which of the following statements is FALSE concerning Policy Servers?
Which of the following statements is FALSE concerning Policy Servers?
What is the problem?
Dr Billis creating rules and objects to control Voice over IP (VoIP) traffic, through his organization’s
VPN-1/FireWall-1 Enforcement Module. Dr Billcreates VoIP-domain SIP objects, to represent each
of his organization’s three SIP gateways. Dr Billthen creates a simple group to contain the VoIP
domain SIP objects. When Dr Billattempts to add the VoIP-domain SIP objects to the group, they
are not listed. What is the problem?
Which is the BEST configuration option?
Dr Billwants to protect internal users from malicious Java code. However, he does not want to strip
Java scripts. Which is the BEST configuration option?
Does Dr Billhave enough information to configure his objects and rules?
Dr Billis a Security Administrator preparing to configure his VPN-1/FireWall-1 Rule Base, to
accommodate Voice over IP (VoIP) traffic. Dr Billhas the information displayed below.
VoIP Domain Session Initiation Protocol (SIP): NorbertEnd Point Domain: 10.10.100.0GateKeeper
Server IP : 10.10.100.Phone Type: Pingtel instant expressa(tm) softphone Version 1.2.1RTP Port
Settings: UDP Port 5079RTCP Port Settings: UDP Port 5075
Does Dr Billhave enough information to configure his objects and rules?
which of the following logs would you MOST likely find the information you need?
You are a VPN-1/FireWall-1 Security Administrator. You must discover the users who are
attempting to circumvent SecureClient protection mechanisms. In which of the following logs
would you MOST likely find the information you need?
Which of the following modes allows a client in a load-balancing environment to retain its connection with the
Which of the following modes allows a client in a load-balancing environment to retain its
connection with the same server during a session?
Which of the following VPN-1/FireWall-1 installation options is MOST appropriate for Dr King’s environme
Dr Billis a Security Administrator preparing to install and deploy VPN-1/FireWall-1 to protect his
company’s information assets. Dr Billonly has one machine to dedicate to security enforcement.
Which of the following VPN-1/FireWall-1 installation options is MOST appropriate for Dr King’s
environment?
Why is the user NOT listed?
Dr Billis a VPN-1/FireWall-1 Security Administrator attempting to implement SecuRemote access.
Dr Billcreates and configures a SecuRemote user. When he goes to his RemoteAccess
Community and attempts to add the new user as a participant, the user is not listed. Why is the
user NOT listed?