What are two probe methods that you can use for logical probes? (select all that apply) - Ping and TCP
Action objects allow you to control how the
... [Show More] category behaves when a website from that category is accessed. Which action object is used to throttle the traffic? - Bandwidth Management (BWM)
Which of the following Address Object types is selected by default in the firewall? - Host
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of ip packets traversing the firewall? - Packet Monitor
Where is the real-time data on the Dashboard compiled and summarized from? - Manage >> AppFlow Settings
What type of information is displayed on the Live Monitor panel?(Select all that apply) - Multi-Core Monitor
Applications
Ingress/Egress Bandwidth
Ingress/Egress Packet Rate
Ingress/Egress Packet Size
Connection Rate
Connection Count
Which file types can be used to export the logs? (Select all that apply) - CSV, TEXT and Email
What is the default timeout setting for administrator inactivity? - 5 Minutes
What type of encoding format is supported when importing an end-user certificate with a private key? - PKCS#12
Which SonicOS GUI option is used to create a snapshot of the current system state? - Create Backup
Which interface is used by SonicOS as the backup hearbeat link? - X0
The firewall snapshot section displays the percentage of encryted traffic flowing through the firewall. - True
Which setting is used to turn on the CFS Security Service? - Manage >> Security Config >> Content Filter >> Select "Sonicwall CFS" for content Filter Type
Which Security Configuration menu option is used to enable client DPI-SSL? - Manage > Security Config > Decryption Services > General Tab, check box "Enable SSL Client Inspection"
and all below it:
Intrusion Prevention, Gateway Anti-Virus, Gateway Anti- Spyware, Application Firewall, Content Filter.
Which Match Object property will control what type of policy it can be used in? - Match object type
What are the key components of a CFS policy?(Select all that apply) - Block
Passphrase (Authenticate)
confirm
Bandwidth Management
Which Logs panel depicts the Eicar test virus file download? - Investigate > Logs > Event Logs
A Site-to-Site VPN can allow simultaneous access to multiples remote servers - True
Which statement about SonicWall Gateway Anti-Virus service is correct? - -It inspects all traffic that traverse the Sonicwall Gateway.
-It inspects multiple application protocols, as well as generic TCP streams and compressed traffic.
-Because Sonicwall GAV does not have to perform reassembly, there are no file-size limitations imposed by the scanning engine.
-Decompression are also performed on a single pass, per packet basic.
Which of the following sentences is correct about HA configuration? - High Availability does not support Portshield interfaces and Native Bridge mode.
What type of NAT policies does a Public Server wizard create? - Inbound, Outbound, and Loopback NAT Policies
Which of the following are included in the output of a network probe? (Select all that apply) - Name, Probe Target, Probe Type, Gateway, Local IP, Interface, Interval, Port, Response Timeout, Failure Threshold, Success Threshold, All Must Respond, RST is failure
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing tha firewall? - Packet Monitor
What are two route policy modes that are enable by Dynamic Routing? - Advanced Routing and Simple RIP Advertisement
Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway? - LAN Settings Panel/ Page
Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces? - Ratio Load Balancing Type
Which of the following are required for WAN ISP Failover and Load balancing?(Select all that apply) - A second ISP connection and Placing each WAN on separate subnets
What does a WAN Failover solution enable?(Select all that apply) - Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and Directing redundant routes to one or more secondary service providers
In the Event Logs, which of the following will generate a log message for any dropped packets? - Manage > Logs & reporting> logs Settings > Base Setup > Expand Network Category > ICMP Packets Dropped, select the box under the GUI column to show in the Event Logs
What type of certificate store be used to install the certificate? - Trusted Root Certification Authorities
What is the SonicOS navigation path to begin configuring the VPN on the firewall? - Manage >> under connectivity >> VPN
What type of object is created to configure a VPN host when implementing a Site-to-site VPN? - An Address Object type Network
What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall? - 3DES
Which feature facilitates the setup and deployment of multiple global VPN clients? - a VPN policy
What does the LDAP server provide to allow or deny user authorization? - Active Directory Membership
Which group of Security Services uses the SonicWall Deep Packet Inspection engine? - Gateway Anti-virus (GAV), Anti-Spyware and Instruction Prevention Service (IPS) [Show Less]