Which technology should you explain to the executives?
Your organization maintains several IKE VPNs. Executives in your organization want to know which mechanism Security Gateway R75 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?
Anti-Spoofing is typically set up on which object type?
Anti-Spoofing is typically set up on which object type?
Select the response below that includes the available actions:
Review the following list of actions that Security Gateway R75 can take when it controls packets. The Policy Package has been configured for Simplified Mode VPN. Select the response below that includes the available actions:
How does the Get Address button, found on the Host Node Object > General Properties page retrieve the addre
[tagged]
How does the Get Address button, found on the Host Node Object > General Properties page retrieve the address?
Which statement defines Public Key Infrastructure? Security is provided:
Which statement defines Public Key Infrastructure? Security is provided:
Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet by IP address? I
You create implicit and explicit rules for the following network. The group object internal-networks includes networks 10.10.10.0 and 10.10.20.0. Assume Accept ICMP requests is enabled as Before last in Global Properties.
Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet by IP address? ICMP will be:
Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?
Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?
When you change an implicit rule’s order from last to first in global properties, how do you make the ch
When you change an implicit rule’s order from last to first in global properties, how do you make the change take effect?
What is used to validate a digital certificate?
What is used to validate a digital certificate?
Do your initial actions meet the required and desired results?
You have just been hired as the Security Administrator for the Insure-It-All insurance company. Your manager gives you the following requirements for controlling DNS traffic:
Required Result #1: Accept domain-name-over-TCP traffic (zone-transfer traffic)
Required Result #2: Log domain-name-over-TCP traffic (zone-transfer traffic)
Desired Result #1: Accept domain-name-over-UDP traffic (queries traffic)
Desired Result #2: Do not log domain-name-over-UDP traffic (queries traffic)
Desired Result #3: Do not clutter the Rule Base try creating explicit rules for traffic that can be controlled using Global Properties
To begin, you make the following configuration changes, and install the Security Policy
– Select the box Accept Domain Name over TCP (Zone Transfer) in Global Properties
– Select the box Accept Domain Name over UDP (Queries) in Global Properties
– Select the box Log Implied Rules in Global Properties
Do your initial actions meet the required and desired results?