Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...
How would you accomplish this?
You have selected the event Port Scan from Internal Network in Smart Event, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?A . Define...
What is the command to upgrade a Secure Platform NG with Application Intelligence (Al) R55 Smart Center Server to VPN-1 NGX using a CD?
What is the command to upgrade a Secure Platform NG with Application Intelligence (Al) R55 Smart Center Server to VPN-1 NGX using a CD?A . cd patch addB . fwm upgrade_toolC . cppkg addD . patch addE . patch add cdView AnswerAnswer: E
The following graphic illustrates which command being issued on Secure Platform?
The following graphic illustrates which command being issued on Secure Platform?A . The administrator will have to open the old session and make the changes, no note is added automatically, however, the manager adds his notes stating the changes required.B . The same session is modified with a note automatically...
Which Security Server can perform authentication tasks, but CANNOT perform content security tasks?
Which Security Server can perform authentication tasks, but CANNOT perform content security tasks?A . TelnetB . HTTPC . rloginD . FTPE . SMTPView AnswerAnswer: C
The Smart Event Correlation Unit:
The Smart Event Correlation Unit:A . adds events to the events database.B . display a the received events.C . looks for patterns according to the installed Event Policy.D . assigns a severity level to an event.View AnswerAnswer: C
Refer to Exhibit below: Match the Cluster XL modes with their configurations.
Refer to Exhibit below: Match the Cluster XL modes with their configurations. A . A - 3, B - 2, C - 4, D - 1B . A - 2, B - 3, C - 1, D - 4C . A - 2, B - 3, C - 4, D...
Which of the following is a possible cause?
Robert has configured a Common Internet File System (CIFS) resource to allow access to the public partition of his company's file server, on \eriscogoldenapplefilespublic. Robert receives reports that users are unable to access the shared partition, unless they use the file server's IP address. Which of the following is a...
Which of the following is NOT a feature of Cluster XL?
Which of the following is NOT a feature of Cluster XL?A . Enhanced throughput in all Cluster XL modes (2 gateway cluster compared with 1 gateway)B . Transparent failover in case of device failuresC . Zero downtime for mission-critical environments with State SynchronizationD . Transparent upgradesView AnswerAnswer: C
When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?
When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?A . It will try to take the policy from one of the other cluster members.B . It will not check for any updated policy and load the last installed policy with a...