which one of the following would you choose to do?
You are working with multiple Security Gateways that enforce an extensive number of rules. To
simplify security administration, which one of the following would you choose to do?
Which rules are not applied on a first-match basis?
Which rules are not applied on a first-match basis?
Which statement is TRUE?
Installing a policy usually has no impact on currently existing connections. Which statement is
TRUE?
How can this be configured?
Several Security Policies can be used for different installation targets. The firewall protecting
Human Resources’ servers should have a unique Policy Package. These rules may only be
installed on this machine and not accidentally on the Internet firewall. How can this be configured?
A ___________ rule is used to prevent all traffic going to the R75 Security Gateway.
A ___________ rule is used to prevent all traffic going to the R75 Security Gateway.
In order for the Security Management Server to install a policy to the Firewall, an explicit rule must be crea
In a distributed management environment, the administrator has removed the default check from
Accept Control Connections under the Policy > Global Properties > FireWall tab. In order for the
Security Management Server to install a policy to the Firewall, an explicit rule must be created to
allow the server to communicate to the Security Gateway on port __________.
How do you accomplish this?
To check the Rule Base, some rules can be hidden so they do not distract the administrator from
the unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do you
accomplish this?
What CANNOT be configured for existing connections during a policy install?
What CANNOT be configured for existing connections during a policy install?
What is the purpose of a Stealth Rule?
What is the purpose of a Stealth Rule?
Which of these Security Policy changes optimize Security Gateway performance?
Which of these Security Policy changes optimize Security Gateway performance?