List the order of steps Kim would go through to add the Dallas Edge appliance to the Remote Office profile usi
The We-Make-Widgets company has purchased twenty UTM-1 Edge appliances for their remote
offices. Kim decides the best way to manage those appliances is to use Smart Provisioning and
create a profile they can all use. List the order of steps Kim would go through to add the Dallas Edge
appliance to the Remote Office profile using the output below.
Enter the name of the profile called “Remote Offices”
Change the provisioning profile to “Remote Offices”
Click File, then select New, then Provisioning Profile
Click on the Devices Tab
Highlight the Dallas Edge appliance, click Edit, then edit Gateway
Click on the Profiles Tab
which of the following?
Smart Provisioning can provision the Operating System and network settings on which of the
following?
Which of the following load-balancing methods is not valid?
Which of the following load-balancing methods is not valid?
The relay mail server configured under Email Notifications is used by the DLP Gateway to: (Choose the BEST ans
The relay mail server configured under Email Notifications is used by the DLP Gateway to: (Choose
the BEST answer.)
why is it important to properly define the topology?
For a dedicated DLP Gateway that runs in inline bridge mode, why is it important to properly define
the topology?
Which protocol is not supported for DLP?
Which protocol is not supported for DLP?
What happens when an Administrator activates the DLP Portal for Self Incident Handling and enters its fully qu
What happens when an Administrator activates the DLP Portal for Self Incident Handling and enters
its fully qualified domain name (DNS name)?
How can you achieve this?
You just upgraded to R71 and are using the IPS Software Blade. You want to enable all critical
protections while keeping the rate of false positive very low. How can you achieve this?
Will you get all the information you need from these actions?
You enable Sweep Scan Protection and Host port scan in IPS to determine if a large amount of traffic
from a specific internal IP address is a network attack, or a user’s system is infected with a worm.
Will you get all the information you need from these actions?
which would be the best configuration to protect from a traffic hijack attempt?
You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a
colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of
the following, which would be the best configuration to protect from a traffic hijack attempt?