1. What are two probe methods that you can use for logical probes? (select all that apply): Ping and TCP
2. Action objects allow you to control how the ca
... [Show More] tegory behaves when a website from that category is accessed. Which action object is used to throttle the traffic?: Bandwidth Management (BWM)
3. Which of the following Address Object types is selected by default in the firewall?: Host
4. Which diagnostic utility on the SonicWall firewall allows you to look at the contents of ip packets traversing the firewall?: Packet Monitor
5. Where is the real-time data on the Dashboard compiled and summarized from?: Manage >> AppFlow Settings
6. What type of information is displayed on the Live Monitor panel?(Select all that apply): Multi-Core Monitor
Applications Ingress/Egress Bandwidth Ingress/Egress Packet Rate Ingress/Egress Packet Size Connection Rate Connection Count
7. Which file types can be used to export the logs? (Select all that apply): -
CSV, TEXT and Email
8. What is the default timeout setting for administrator inactivity?: 5 Minutes
9. What type of encoding format is supported when importing an end-user certificate with a private key?: PKCS#12
10. Which SonicOS GUI option is used to create a snapshot of the current system state?: Create Backup
11. Which interface is used by SonicOS as the backup heartbeat link for HA?: X3
12. The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.: True
13. Which setting is used to turn on the CFS Security Service?: Manage >> Security Config >> Content Filter >> Select "Sonicwall CFS" for content Filter Type
14. Which Security Configuration menu option is used to enable client
DPI-SSL?: Manage > Security Config > Decryption Services > General Tab, check box "Enable SSL Client Inspection"
and all below it:
Intrusion Prevention, Gateway Anti-Virus, Gateway Anti- Spyware, Application Firewall, Content Filter.
15. Which Match Object property will control what type of policy it can be used in?: Match object type
16. What are the key components of a CFS policy?(Select all that apply): -
Block
Passphrase (Authenticate) confirm
Bandwidth Management
17. Which Logs panel depicts the Eicar test virus file download?: Investigate
> Logs > Event Logs
18. A Site-to-Site VPN can allow simultaneous access to multiples remote servers: True
19. Which statement about SonicWall Gateway Anti-Virus service is correct?-
: -It inspects [Show Less]