What is the correct antispoofing setting on interface ETH1 in this network diagram?
As a Security Administrator, you must configure antispoofing on Security Gateway interfaces, to protect your Internal networks. What is the correct antispoofing setting on interface ETH1 in this network diagram?
NOTE In the DMZ, mail server 192.168.16.10 is statically translated to the object "mail_valid", with IP address 210.210.210.3. The FTP server 192.168.16.15 is statically translated to the object "flp_valid", with IP address 210.210.210.5
Is State Synchronization working properly between the two members?
State Synchronization is enabled on both members in a cluster, and the Security Policy is successfully installed. No protocols or services have been unselected for "selective sync". The following is the fwtab t connections s output from both members: (Exhibit)
Is State Synchronization working properly between the two members?
Which of the following QoS rule action properties is an Advanced action type
Which of the following QoS ruleaction properties is an Advanced action type, only available in Traditional mode?
How is the Security Gateway VPN Domain created?
The following diagram illustrates how a VPN1 SecureClient user tries to establish a VPN with hosts in the external_net and internal_net from the Internet. How is the Security Gateway VPN Domain created?
Which application should Tess use, to determine the number of packets dropped by each Gateway?
Tess King is the security Administrator for TestKing.com with a large call center.
The management team in the center is concerned that employees may be installing and attempting to use peertopeer filesharing utilities, during their lunch breaks.
The call center’s network is protected by an internal Security Gateway, which is configured to drop peertopeer filesharing traffic.
Which application should Tess use, to determine the number of packets dropped by each Gateway?
Which of the following configurations is MOST appropriate for Tess King?
Tess King is concerned that a denialofservice (DoS) attack may affect his VPN Communities. Mrs. King decides to implement IKE DoS protection. Tess needs to minimize the performance impact of implementing this new protection.
Which of the following configurations is MOST appropriate for Tess King?(Exhibit)
To provide the BEST longterm security, you should
You are trying to enter a new user, group, or organizational unit on an LDAP server, and you encounter the error "violates schema". To provide the BEST longterm security, you should
Are these machines correctly configured for a ClusterXL deployment?
You are preparing computers for a new ClusterXL deployment For your cluster, you plan to use three machines with the following configurations:(Exhibit)
Are these machines correctly configured for a ClusterXL deployment?
What is the problem?
Dr King tries to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match Dr King sees the following screen. What is the problem? (Exhibit)
How can you reset the password of the Security Administrator?
How can you reset the password of the Security Administrator, which was created during initial installation of the SmartCenter Server on SecurePlattform? (Exhibit)