Which of the following methods will provide the most complete backup of an R75 configuration?
Which of the following methods will provide the most complete backup of an R75 configuration?
Which set of objects have an Authentication tab?
Which set of objects have an Authentication tab?
How do you create this schedule?
Your R75 primary Security Management Server is installed on SecurePlatform. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours.
How do you create this schedule?
What is the difference between Standard and Specific Sign On methods?
What is the difference between Standard and Specific Sign On methods?
Which backup-and-restore solution do you use?
[tagged]
You need to back up the routing, interface, and DNS configuration information from your R75 SecurePlatform Security Gateway. Which backup-and-restore solution do you use?
Which authentication type requires specifying a contact agent in the Rule Base?
Which authentication type requires specifying a contact agent in the Rule Base?
Users are not prompted for authentication when they access their Web servers…
Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Why?
What is the easiest way to back up your Security Gateway R75 configuration, including routing and network conf
Your primary Security Management Server runs on SecurePlatform. What is the easiest way to back up your Security Gateway R75 configuration, including routing and network configuration files?
What is the BEST method to reinstall the Server and keep its critical configuration?
Your R75 enterprise Security Management Server is running abnormally on Windows 2003 Server. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep its critical configuration?
Which of the following objects is a valid source in an authentication rule?
Which of the following objects is a valid source in an authentication rule?