which the user is allowed to connect?
When configuring a new user with AMC which options are available to restrict the times at which
the user is allowed to connect? (Choose all that apply)
True or false?
In a SEP VPN when a gateway fails, a backup will take its place but all client connections will have
to be remade.
True or false?
What are the two modes for phase 1 of the ISAKMP scheme?
What are the two modes for phase 1 of the ISAKMP scheme? (Choose two)
Which encryption algorithm as supported by VPN1/WF1 uses a key length between 112-168 bits?
Which encryption algorithm as supported by VPN1/WF1 uses a key length between 112-168 bits?
which gateway is used for the Secure Client connection?
When using a proper subset encryption domain, which gateway is used for the Secure Client
connection?
Where is that replacement URI specified?
If a web user has requested a URL that contains unsuitable material it is possible, with content
security, to specify a replacement URI that will warn the user. Where is that replacement URI
specified?
which is NOT a valid log message that can be reported?
When the “generate log” option is checked for desktop security which is NOT a valid log message
that can be reported?
Where would you define encryption for a firewall?
Where would you define encryption for a firewall?
What is this function called?
It is possible to configure in the rule base an event such as a log or to run an executable when the
entry in the rule base is triggered. What is this function called?
What is the name given to the ability of SecuRemote gateways to provide redundancy?
What is the name given to the ability of SecuRemote gateways to provide redundancy?