Does Katie’s solution meet the required and desired results?
Katie is the Security Administrator for an insurance company. Her manager gives Katie the following requirements for controlling DNS traffic:
Required Result #1: Accept domain-name-over-TCP traffic (zone-transfer traffic).
Required Result #2: Log domain-name-over-TCP traffic (zone-transfer traffic).
Desired Result #1: Accept domain-name-over-UDP traffic (queries traffic).
Desired Result #2: Do not log domain-name-over-UDP traffic (queries traffic).
Desired Result #3: Do not clutter the Rule Base by creating explicit rules for traffic that can be controlled using Global Properties.
Katie makes the following configuration changes, and installs the Security Policy:
1. She selects the box "Accept Domain Name over TCP (Zone Transfer)" in Global Properties.
2. She selects the box "Accept Domain Name over UDP (Queries)" in Global Properties.
3. She selects the box "Log Implied Rules" in Global Properties.
Does Katie’s solution meet the required and desired results?
Which of the following commands will do this?
Shauna is troubleshooting a Security Gateway that is dropping all traffic whenever the most recent Security Policy is installed. Working at the Security Gateway, Shauna needs to uninstall the Policy, but keep the processes running so she can see if there is an issue with the Gateway’s firewall tables. Which of the following commands will do this?
Which SmartView Tracker selection is best suited for this?
Doug wants to know who installed a Security Policy blocking all traffic from the corporate network. Which SmartView Tracker selection is best suited for this?
How many administrators can be created during installation of the SmartCenter Server?
How many administrators can be created during installation of the SmartCenter Server?
Which SmartConsole application should Herman use to confirm his suspicions?
Herman is attempting to configure a site-to-site VPN with one of his firm’s business partners. Herman thinks Phase 2 negotiations are failing. Which SmartConsole application should Herman use to confirm his suspicions?
What is the proper command for exporting users in LDAP format?
What is the proper command for exporting users in LDAP format?
Which of these changes to a Security Policy optimizes Security Gateway performance?
Which of these changes to a Security Policy optimizes Security Gateway performance?
Using SmartDefense how do you notify the Security Administrator that malware is scanning specific ports?
Using SmartDefense how do you notify the Security Administrator that malware is scanning specific ports? By enabling:
Which of the following is a valid cause?
A user attempts authentication using SecureClient. The user’s password is rejected, even though it is correctly defined in the LDAP directory. Which of the following is a valid cause?
what happens if you Ping from host 10.10.10.5 to a host on the Internet, by IP address?
You create implicit and explicit rules for the following network. The group object "internal-networks" includes networks 10.10.10.0 and 10.10.20.0. Assume "Accept ICMP
requests" is enabled as before last in the Global Properties.Based on these rules, what happens if you
Ping from host 10.10.10.5 to a host on the Internet, by IP address? ICMP will be: