In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)
In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)A . SmartConsole and WebUI on the Security Management Server. B. SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed. C. Command line of the Security Management Server or mgmt_cli.exe...
Where can administrator edit a list of trusted SmartConsole clients?
Where can administrator edit a list of trusted SmartConsole clients?A . cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server. B. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings > Permissions...
In which scenario is it a valid option to transfer a license from one hardware device to another?
In which scenario is it a valid option to transfer a license from one hardware device to another?A . From a 4400 Appliance to a 2200 Appliance B. From a 4400 Appliance to an HP Open Server C. From an IBM Open Server to an HP Open Server D. From...
Which of the following is used to enforce changes made to a Rule Base?
Which of the following is used to enforce changes made to a Rule Base?A . Publish database B. Save changes C. Install policy D. Activate policyView AnswerAnswer: A
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the followingA . Security Policy Management and Log Analysis B. Security Policy Management. Log Analysis. System Health Monitoring. Multi-Domain Security Management. C. Security Policy Management Log Analysis and System Health Monitoring D....
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?A . Object Browser B. Object Editor C. Object Navigator D. Object ExplorerView AnswerAnswer: D
Which path below is available only when CoreXL is enabled?
Which path below is available only when CoreXL is enabled?A . Slow path B. Firewall path C. Medium path D. Accelerated pathView AnswerAnswer: C
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?A . Protections B. IPS Protections C. Profiles D. ThreatWikiView AnswerAnswer: B
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?A . IPS blade B. IPSEC VPN Blade C. Identity Awareness Blade D. Firewall BladeView AnswerAnswer: A
What is the best upgrade method when the management server is not connected to the Internet?
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?A . Export R80 configuration, clean install R80.10 and import the configuration B. CPUSE online upgrade C. CPUSE offline upgrade D. SmartUpdate upgradeView AnswerAnswer: C