Which of the following CPMAD parameter types controls the amount of time old events stay in the CPMAD tables?
Which of the following CPMAD parameter types controls the amount of time old events stay in the
CPMAD tables?
What is that character?
When configuring match parameters for content security resources it is possible to use a wild card
character to represent anything. What is that character?
1 – c 2 – cn 3 – o 4 – ou
Put the following LDAP distinguished name entities in hierarchical order starting from the root.
1 – c
2 – cn
3 – o
4 – ou
What connection method should be used in the general tab of the URI resource definition when configuring HTTP
If the HTTP security server is defined as a proxy for a web browser. What connection method
should be used in the general tab of the URI resource definition when configuring HTTP content
security.
How would you configure a rule for a Secure Client user?
How would you configure a rule for a Secure Client user?
you need to make a copy of the following files: $FWDIR/conf/objects_5_0.C $FWDIR/conf/*.W $FWDIR/conf/rulebase
If you want to backup your security policy you need to make a copy of the following files:
$FWDIR/conf/objects_5_0.C
$FWDIR/conf/*.W
$FWDIR/conf/rulebases.fws
$FWDIR/database/fwauth.NDB*
True or false?
Which security server or service provides protection by: hiding IP addresses from outgoing email, strips Mime
Which security server or service provides protection by: hiding IP addresses from outgoing email,
strips Mime attachment types, drops large messages, and perform mail filtering?
Which of the following desktop policies can be modified by the Secure Client user?
Which of the following desktop policies can be modified by the Secure Client user?
What parameter in userc.C allows you to set the port for topology download?
What parameter in userc.C allows you to set the port for topology download?
Which is NOT a viewing option on the log viewer screen?
Which is NOT a viewing option on the log viewer screen?