Which 4 of the following are tested and supported virtualization platforms for XG Firewall?
Select one or
... [Show More] more:
a.Hyper-V
b.KVM
c.VMWare
d.Xen
e.Virtual Box
f.Oracle VM
g.Qemu
What feature is required if you want to make use of lateral movement protection?
a.Intercept X
b.Advanced Threat Protection (ATP)
c.Intrusion Prevention System (IPS)
d.Sandstorm Sandboxing
When configuring a route, which of the following allows you to select traffic for routing based on user and application?
Select one:
a.SD-WAN Policy Route
b.Static Route
c.BGP
d.OSPF
e.RIP
You have received a new hardware XG Firewall and are preparing to connect to it for the first time. What is the default IP address and port that is used to access the WebAdmin of the device?
Select one:
a.HTTPS://172.16.16.16:4444
b.HTTPS://172.16.16.16:443
c.HTTPS://172.16.16.254:18080
d.HTTPS://192.168.0.1:4444
e.HTTPS://192.168.0.254:443
Which deployment mode is also known as transparent or inline mode?
Select one:
a.Gateway Mode
b.Bridge Mode
c.Web Application Firewall (WAF)
d.Discover Mode
Which interface type allows standard routing to be used to send traffic over the VPN?
Select one:
a.Bridge
b.Alias
c.VLAN
d.Tunnel
e.WIFI
Which XG Firewall feature is able to block access to command and control servers?
Select one:
a.Advanced Threat Protection (ATP)
b.SSL/TLS inspection
c.Application control
d.Intrusion Prevention (IPS)
Which feature can harden forms, sign cookies and scan for malware?
Select one:
a.Web Server Protection
b.Intrusion Prevention (IPS)
c.Advanced Threat Protection (ATP)
d.Security Heartbeat
Which additional controls available through the ellipses menu for firewall rules, can be useful when troubleshooting?
Select one:
a.Detaching the rule from a group
b.Resetting the data counter for the rule
c.Moving the rule to a specific position
d.Delete the rule
Which XG Firewall feature sends decrypted packets to IPS, application control, web filtering and antivirus for checking?
Select one:
a.SSL/TLS inspection
b.Advanced Threat Protection (ATP)
c.Application control
d.Sandstorm sandboxing
Which 2 of the following statements correctly describe how firewall rules are applie
Select one or more:
a.All firewall rules are applied to all packets
b.Packets are tested against all firewall rules and the best match is used
c.Packets are tested against firewall rules in order and the first match is used
d.Packets which match a DNAT rule are ignored by the firewall
e.Packets that don't match a firewall rule are dropped and logged
Which of the following DoS and spoof protection modes will drop packets if the source IP address does not match an entry on the firewall's routing table?
Select one:
a.IP Spoofing
b.MAC filter
c.IP-MAC
What is required when creating an IPsec VPN policy?
Select one:
a.Both sides of the VPN must allow the same settings
b.Both sides of the VPN must be encrypted
c.Both sides of the VPN must be created on the same hardware
d.Both sides of the VPN must be using the same software
When a RED is deployed in Standard/Unified mode, how do the computers on the remote network get their IP address?
Select one:
a.From a DHCP server running on the XG Firewall
b.From a DHCP server running on the RED
c.From a DHCP server running on the router at the remote site
TRUE or FALSE: All site-to-site or remote access VPN connections are automatically added to the VPN zone.
Select one:
True
False
What type of user can be created to allow temporary access to network resources with the least amount of effort?
Select one:
a.Guest User
b.Clientless User
c.Directory Service User
d.System User
When using STAS, where in the network can the agent software be installed and configured?
Select one:
a.On a Microsoft Active Directory server in the network
b.On a Novell directory server on the network
c.On a server that is not a member of the domain
d.On the XG Firewall that will be authenticating users
e.On each computer connecting to the network [Show Less]