Which encryption algorithm as supported by VPN1/WF1 uses a key length between 112-168 bits?
Which encryption algorithm as supported by VPN1/WF1 uses a key length between 112-168 bits?
which gateway is used for the Secure Client connection?
When using a proper subset encryption domain, which gateway is used for the Secure Client
connection?
Where is that replacement URI specified?
If a web user has requested a URL that contains unsuitable material it is possible, with content
security, to specify a replacement URI that will warn the user. Where is that replacement URI
specified?
which is NOT a valid log message that can be reported?
When the “generate log” option is checked for desktop security which is NOT a valid log message
that can be reported?
Where would you define encryption for a firewall?
Where would you define encryption for a firewall?
What is this function called?
It is possible to configure in the rule base an event such as a log or to run an executable when the
entry in the rule base is triggered. What is this function called?
What is the name given to the ability of SecuRemote gateways to provide redundancy?
What is the name given to the ability of SecuRemote gateways to provide redundancy?
Which is NOT a valid policy for a Secure Client desktop?
Which is NOT a valid policy for a Secure Client desktop?
What is the name of the program that can be used to carry out a predefine function if an alert is triggered a
What is the name of the program that can be used to carry out a predefine function if an alert is
triggered a number of times within a set period?
What is the purpose of the "respond to unauthenticated topology requests" in relation to a SecuRemot
What is the purpose of the “respond to unauthenticated topology requests” in relation to a
SecuRemote client?