True or false?
When configuring CPMAD, the global clean interval time setting overrides the individual time
interval setting for a particular attack. True or false?
How is the Security Gateway VPN Domain created?
The following diagram illustrates how a VPN-1 SecureClient user tries to establish a VPN with
hosts in the external_net and internal_net from the Internet. How is the Security Gateway VPN
Domain created?
Which of the following suggestions regarding Security Policies will NOT improve performance?
Which of the following suggestions regarding Security Policies will NOT improve performance?
Selecting the optiondisplays the resulting profile that is ___________?
Fill in the blank. Consider the following imageof the support groups propertiesscreen. Selecting the
optiondisplays the resulting profile that is ___________?
which port?
Pulling Certificates from an ICA uses which port?
Which VPN-1/FW-1 feature is designed to scan the log file, and alert the administrator to a suspicious sequenc
Which VPN-1/FW-1 feature is designed to scan the log file, and alert the administrator to a
suspicious sequence of events?
What is causing the State Synchronization problem?
A cluster contains two members, with external interfaces 172.28.108.1 and 172.28.108.2. The
internal interfaces are 10.4.8.1 and 10.4.8.2. The external cluster’s IP address is 172.28.108.3,
and the internal cluster’s IP address is 10.4.8.3. The synchronization interfaces are 192.168.1.1
and 192.168.1.2. The Security Administrator discovers State Synchronization is not working
properly, cphaprob if command output displays as follows:What is causing the State
Synchronization problem?
Which license type is the BEST for your deployemenet?
You are a Security Administrator attempting to license a distributed VPN-1/Firwall-1 configuration
with three Enforcement Modules and one SmartCenter Server. Which license type is the BEST for
your deployemenet?
Which Endpoint Security Media Encryption component shouldMultibank’s SecurityAdministrator as a solution?
Multibank faces new information assurance requirementsto prevent the installation ofunknown
removable mediadeviceson internal workstations, and monitor device usage. Which Endpoint
Security Media Encryption component shouldMultibank’s SecurityAdministrator as a solution?
How do you run fw ctl debug, to see all information about a cluster?
How do you run fw ctl debug, to see all information about a cluster?