Which parameters may be defined in an Access Role?
A. Networks, Users, Time Objects
B. Users, Applications, Machines
C. Networks, Users, Machines
D. Networks, Targets, Users
正解:C
質問 2:
In setting up your first Application Control Policy for discovery. What is the best Rule Track to choose?
A. Alert
B. SNMP
C. Log
D. Mail
正解:C
質問 3:
When the Application Control Blade discovers an application, it will provide information on that application's properties, simple and complex. Which is an example of a complex property?
A. Auto Starts
B. Uses Web Connection
C. No Standard Uninstaller
D. Sends Email
正解:C
質問 4:
Your company needs to allow contractor access on the network, but for security reasons they need to be authenticated, before they can access the Internet. How would you configure Identity Awareness on the firewall to meet this requirement? Enable Identity Awareness, turn on:
A. Radius Accounting, and configure a Radius server to allow External guest account login
B. Identity agent, and configure users Directory to use External user profiles.
C. browser-based authentication, and configure the captive portal to allow unregistered guest login.
D. Active Directory Query, and configure the LDAP server to allow a guest account login.
正解:C
質問 5:
You want to view application traffic logs in real-time. Which tool would be BEST to use?
A. SmartView Monitor
B. SmartView Tracker
C. SmartEvent Intro
D. SmartEvent
正解:B
質問 6:
When the gateway gets heavily loaded because of IPS inspection tasks, what are the choices an administrator may select?
A. Bypass (definition of CPU and memory thresholds)
B. Revert to default_protection profile
C. Block all traffic
D. This should never happen (gateway should be sized accordingly)
正解:A
質問 7:
Dangerous websites are offering encrypted connections using HTTPS. The Chief Information Officer in your company decided to start inspecting such traffic. What step needs to be done in order to avoid SSL error messages when accessing sites?
A. Nothing needs to be done, the clients will automatically trust the CA.
B. Deploy the outbound certificate in the company, thus the clients will trust the CA.
C. You need to purchase an official certificate for the gateway.
D. Create a bypass list for all the sites that produce error Messages.
正解:B
野*绫 -
問題自体は難しくないようなのでこれ1冊だけでいけるのではないかと思います。知識をさらに強化して試験に合格しました。