which should be used by all Security Administrators?
The ____________ and ____________ Rules are the two basic rules which should be used by all
Security Administrators?
Which item below in a Security Policy would be enforced first?
Which item below in a Security Policy would be enforced first?
how can you then disable the rule?
When you hide a rule in a Rule Base, how can you then disable the rule?
how can you then disable the rule?
When you hide a rule in a Rule Base, how can you then disable the rule?
A Cleanup rule.
A Cleanup rule.
Which statement is TRUE about implicit rules?
Which statement is TRUE about implicit rules?
Where in the Rule Base should the Accept ICMP Requests implied rule have no effect?
You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the
Accept ICMP Requests implied rule have no effect?
All of the following are Security Gateway control connections defined by default implied rules, EXCEPT:
All of the following are Security Gateway control connections defined by default implied rules,
EXCEPT:
In order for the Security Gateway to send logs to the Security Management Server…
In a distributed management environment, the administrator has removed all default check boxes
from the Policy > Global Properties > Firewall tab. In order for the Security Gateway to send logs
to the Security Management Server, an explicit rule must be created to allow the Security Gateway
to communicate to the Security Management Server on port ______.
What configuration remains the same no matter which version is used?
A Security Policy has several database versions. What configuration remains the same no matter
which version is used?