When restoring a Security Management Server from a backup file, the restore package can be retrieved from which source?

When restoring a Security Management Server from a backup file, the restore package can be retrieved from which source?A . HTTP server, FTP server, or TFTP serverB . Disk, SCP server, or TFTP serverC . Local folder, TFTP server, or FTP serverD . Local folder, TFTP server, or DiskView AnswerAnswer:...

May 9, 2019No CommentsREAD MORE +

How could you compare the Fingerprint shown to the Fingerprint on the server?

How could you compare the Fingerprint shown to the Fingerprint on the server? A . Run cpconfig, select the Certificate's Fingerprint option and view the fingerprintB . Run cpconfig, select the GUI Clients option and view the fingerprintC . Run cpconfig, select the Certificate Authority option and view the fingerprintD...

May 9, 2019No CommentsREAD MORE +

What kind of problems can be caused by the automatic updates?

You are running R71 and using the new IPS Software Blade. To maintain the highest level of security, you are doing IPS updates regularly. What kind of problems can be caused by the automatic updates?A . None; updates will not add any new security checks causing problematic behavior on the...

May 9, 2019No CommentsREAD MORE +

There are times when you want to use Link Selection to manage high-traffic VPN connections.

There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:A . Assign links to specific VPN communities.B . Assign links to use Dynamic DND . Use links based on services.E . Prohibit Dynamic DNView AnswerAnswer: C

May 8, 2019No CommentsREAD MORE +

Which of the following statements accurately describes the upgrade export command?

Which of the following statements accurately describes the upgrade export command?A . Used primarily when upgrading the Security Management Server, upgrade export stores all object databases and the conf directories for importing to a newer version of the Security Gateway.B . Used when upgrading the Security Gateway, upgrade export includes...

May 8, 2019No CommentsREAD MORE +

There are several Smart Directory (LDAP) features that can be applied to further enhance Smart Directory (LDAP) functionality, which of the following is NOT one of those features?

There are several Smart Directory (LDAP) features that can be applied to further enhance Smart Directory (LDAP) functionality, which of the following is NOT one of those features?A . High Availability, where user information can be duplicated across several serversB . Support multiple Smart Directory (LDAP) servers on which many...

May 8, 2019No CommentsREAD MORE +

What is a "sticky" connection?

What is a "sticky" connection?A . A Sticky Connection is one in which a reply packet returns through the same gateway as the original packet.B . A Sticky Connection is a VPN connection that remains up until you manually bring it down.C . A Sticky Connection is a connection that...

May 8, 2019No CommentsREAD MORE +

The process that performs the authentication for Smart Dashboard is:

The process that performs the authentication for Smart Dashboard is:A . fwmB . vpndC . cvpndD . cpdView AnswerAnswer: A

May 8, 2019No CommentsREAD MORE +

Which statement defines Public Key Infrastructure? Security is provided:

Which statement defines Public Key Infrastructure? Security is provided:A . by Certificate Authorities, digital certificates, and two-way symmetric-key encryption.B . by Certificate Authorities, digital certificates, and public key encryption.C . via both private and public keys, without the use of digital Certificates.D . by authentication.View AnswerAnswer: B

May 8, 2019No CommentsREAD MORE +

By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other cluster members.

By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other cluster members.A . BroadcastB . UnicastC . MulticastD . Shout castView AnswerAnswer: C

May 8, 2019No CommentsREAD MORE +