Which type of authentication will require users to TELNET to port 259 or connect via HTTP at port 900 to be au
Which type of authentication will require users to TELNET to port 259 or connect via HTTP at port
900 to be authenticated for a service?
What is the purpose of NAT?
What is the purpose of NAT? (Select all that apply.)
how many rule bases would you need?
If the security policy is enforced by more than two firewalls how many rule bases would you need?
what option do you select to delete all entries in the log file, regardless of which entries are selected?
In Log Viewer GUI what option do you select to delete all entries in the log file, regardless of which
entries are selected?
______ rules, defined in a firewall object’s properties, are enforced before any rule in the Security Po
______ rules, defined in a firewall object’s properties, are enforced before any rule in the Security
Policy’s Rule Base.
What happens to current log file when you create a new log file?
What happens to current log file when you create a new log file?
The rules that you define in the Rule Base are known as ______ rules.
The rules that you define in the Rule Base are known as ______ rules.
The database includesnetwork object definitions, user definitions, security policy, and the log files.
The ______________ maintains the VPN-1/Firewall-1 NG database. The database
includesnetwork object definitions, user definitions, security policy, and the log files.
What command uninstalls the currently loaded Inspection Code from selected targets?
What command uninstalls the currently loaded Inspection Code from selected targets?
Why would an administrator want to negate a selected object in the Rule Base?
Why would an administrator want to negate a selected object in the Rule Base?