One of the functions of the SmartDefense console is to:
One of the functions of the SmartDefense console is to:
A collection of gateways that are synchronized in a VPN topology are called a ___________?
A collection of gateways that are synchronized in a VPN topology are called a ___________?
What is the BEST configuration for VPN Communities among the branch offices and their headquarters, and betwee
Your company has two headquarters, one in London, one in New York. Each headquarters
includes several branch offices. The branch offices only need to communicate with the
headquarters in their country, not with each other, and only the headquarters need to
communicate directly. What is the BEST configuration for VPN Communities among the branch
offices and their headquarters, and between the two headquarters? VPN Communities comprised
of:
The SANS Dshield.org Storm center integrates with SmartDefense, by: (Choose two)
The SANS Dshield.org Storm center integrates with SmartDefense, by: (Choose two)
what may be a reason for a users password to be rejected?
When using LDAP what may be a reason for a users password to be rejected?
Which two other objects should you have created first?
You are preparing to configure your VoIP Domain Gatekeeper object. Which two other objects
should you have created first?
which type of address translation?
Systems needing to be accessed from the Internet should use which type of address translation?
Which API is used by applications to write to the VPN-1/FW-1 log database?
Which API is used by applications to write to the VPN-1/FW-1 log database?
What is the most appropriate setting Yoav should choose?
Yoav is a Security Administrator preparing to implement a VPN solution for his multi-site
organization. To comply with industry regulations, Yoav’s VPN solution must meet the following
requirements:
Portability: Standard
Key management: Automatic, external PKI
Session keys: Changed at configured times during a connection’s lifetime
Key length: No less than 128-bit
Data integrity: Secure against inversion and brutE. force attacks
What is the most appropriate setting Yoav should choose?
which of the following?
VPN-1/FireWall-1 logs are exportable to other applications, such as spreadsheets or databases,
using which of the following?