How would you request and apply the license?
Your organization’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway. How would you request and apply the license? Request a central license:
Which of the following could be the cause of the problem?
Sarah is the Security Administrator for a sporting-goods manufacturer.
Sarah has configured SmartDefense to block the CWD and FIND commands. Sarah installs the Security Policy, but the Security Gateway continues to pass the commands. Which of the following could be the cause of the problem?
When restoring NGX using the upgrade_import command, which of the following items are NOT restored?
When restoring NGX using the upgrade_import command, which of the following items are NOT restored?
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
Which type of TCP attack is a bandwidth attack, where a client fools a server into sending large amounts of da
Which type of TCP attack is a bandwidth attack, where a client fools a server into sending large amounts of data, using small packets?
What happens when you select File>Export from the SmartView Tracker menu?
What happens when you select File>Export from the SmartView Tracker menu?
What other settings would be appropriate?
Ellen is performing penetration tests against SmartDefense for her Web server farm. She needs to verify that the Web servers are secure against traffic hijacks. She has activated the Cross-Site Scripting property. What other settings would be appropriate? Ellen:
How would you reinstall the Server and keep its configuration?
Your NGX enterprise SmartCenter Server is working normally. However, you must reinstall the SmartCenter Server, but keep the SmartCenter Server configuration (for example, all Security Policies, databases, etc.) How would you reinstall the Server and keep its configuration?
Which encryption scheme provides “In-place” encryption?
Which encryption scheme provides "In-place" encryption?
Will Phil get all the information he needs from these actions?
Phil notices a large amount of traffic from a specific internal IP address. He needs to verify if it is a network attack, or a user’s system infected with a worm. He has enabled Sweep Scan Protection and Host port scan in SmartDefense. Will Phil get all the information he needs from these actions?