1. A customer has an established base of GVC VPN users with a WAN GroupVPN policy configured. The customer wants to begin an implemen- tation for SSL VPN
... [Show More] users. The existing group of GVC VPN users must be converted to SSL VPN users because the SonicWALL security appliance does not support both types of VPN users.: FALSE
2. SSL VPN eliminates the need for remote access authentication.: FALSE
3. Which of the following correctly describes how a bandwidth management rule works?
-Can be configured for all VPN traffic
-Only applies to outbound traffic from the firewall to the WAN or any other destination
-Can be configured only for individual VPN Security Associations
-Only applies to inbound traffic from the WAN to the firewall: Can be config- ured for all VPN traffic
4. What are the benefits provided by a VPN (select all that apply)?
-Securely connects distributed networks together
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication: -Securely connects distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication
5. What benefits are provided by a VPN (select all that apply)?
-Reporting
-Increased capacity
-Scalability
-Encryption
-Security: -Scalability
-Encryption
-Security
6. Which of the following is the most basic firewall technology?
-Packet filtering
-Single firewall
-Deep packet inspection
-Application proxies: -Packet filtering
7. The default firewall access rule allows all communication from the LAN to the Internet.
-True
-False: -True
8. What are two advantages of a multiple firewall?
-Protects restricted special resources
-Offers protection from external attacks while each network segment has free access to other segments
-Helps protect entire departments: What are two advantages of a multiple firewall?
-Protects restricted special resources
9. What is the purpose of a security policy?
-To authenticate the process by which users and devices are identified and granted access to the network
-To monitor the network security and make sure the firewall is configured properly to prevent inappropriate usage
-To make it more difficult for hackers to locate a security hole in a network's gateway
-To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk: -To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk
10. What question would you ask to get specific information on user restric- tions?
-What kinds of network traffic will you allow?
-Will the computers be locked away from the public, or will they have access
to the hardware?
-Will users be allowed to login at any time, from any location, to any machine?
-Who should be allowed to access your services?: -Will users be allowed to login at any time, from any location, to any machine?
11. Content Filtering Services applies to which of the following traffic proto- cols? (Select all that apply.)
-HTTPS
-FTP
-HTTP
-Email attachments: -HTTP
-HTTPS
12. If the appliance loses connection to the SonicWALL site rating library: (Select all that apply.)
-CFS blocks all web traffic (based on configuration)
-CFS continues to operate using the last ratings seen
-CFS allows all web traffic (based on configuration)
-CFS must use its internal logic to identify which traffic to block: -CFS blocks all web traffic (based on configuration)
-CFS allows all web traffic (based on configuration)
13. With Sonic [Show Less]