To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.)
To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.)A . You can only send log messages to Dimension from a computer that is on the network behind your gateway Firebox.B . You...
What settings could you modify in the local device configuration to resolve this issue?
While troubleshooting a branch office VPN tunnel, you see this log message: 2014-07-23 12:29:15 iked (203.0.113.10<->203.0.113.20) Peer proposes phase one encryption 3DES, expecting AES What settings could you modify in the local device configuration to resolve this issue? (Select one.)A . BOVPN Gateway settingsB . BOVPN-Allow policiesC . BOVPN Tunnel...
Which takes precedence: WebBlocker category match or a WebBlocker exception?
Which takes precedence: WebBlocker category match or a WebBlocker exception?A . WebBlocker exceptionB . WebBlocker category matchView AnswerAnswer: B
If you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use?
You have a privately addressed email server behind your Firebox. If you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use? (Select one.)A . In the SMTP...
Which of these threats can the Firebox prevent with the default packet handling settings? (Select four.)
Which of these threats can the Firebox prevent with the default packet handling settings? (Select four.)A . Access to inappropriate websitesB . Denial of service attacksC . Flood attacksD . Malware in downloaded filesE . Port scansF . Viruses in email messagesG . IP spoofingView AnswerAnswer: B,C,E,G
In the network configuration in this image, which aliases is Eth2 a member of? (Select three.)
In the network configuration in this image, which aliases is Eth2 a member of? (Select three.) A . Any-optionalB . Any-ExternalC . Optional-1D . AnyE . Any-TrustedView AnswerAnswer: A,C,D
From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them.
From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them.A . TrueB . FalseView AnswerAnswer: B
You can configure your Firebox to automatically redirect users to the Authentication Portal page.
You can configure your Firebox to automatically redirect users to the Authentication Portal page.A . TrueB . FalseView AnswerAnswer: B
What option could you choose to make sure the newsletter is delivered to your users?
An email newsletter about sales from an external company is sometimes blocked by spamBlocker. What option could you choose to make sure the newsletter is delivered to your users? (Select one.)A . Add a spamBlocker exception based on the From field of the newsletter email.B . Set the spamBlocker action...
Based on the configuration shown in this image, what could be the problem with this policy configuration?
Users on the trusted network cannot browse Internet websites. Based on the configuration shown in this image, what could be the problem with this policy configuration? (Select one.)A . The default Outgoing policy has been removed and there is no policy to allow DNS traffic.B . The HTTP-proxy policy has...