Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
After the sso agent returns the user information, the firewall will query the configured authentication server to obtain which of the following?-group membership -user principal name -distinguished names -user login credentials
Select the connectivity test that you can complete on the check network settings page (Select all that apply)-license manager-content filtering-ping dhcp server -mysonicwall -isp gateway
which diagnostic tool in sonicos is used to find the location of an IP address?-path ping-trace route -ping -network path
What type of threats does Enhanced security inspect?-high and medium -medium and lowest-high only-none of the above
HA Primary and Secondary firewalls will habe different settings.-True -False
It is recommended to use ICMP as the Main Target Probe.True False
Both HA Primary and Secondary firewalls can be managed individually using the monitoring IP address.TrueFalse
the interface through which the firewall is managed can be disabled.True False
what type of objects are configured to be associated with a cfs policy? (Select all that apply)-profile object -action object-service object-match object
in addition to signature level control, app control allows granular control of traffic at which level?-users-ip subnets -email addresses -all of above
identify some best practices related to applcontrol configuration. (Select all that apply)-distribute bandwidth utilization equally across all applications-enable logging, as needed, per application -assign common access rules to all users, regardless of groups-rate-limit application traffic
wich load balancing mode uses a ranking method to determine the order of preemption when configuring WAN failover/load balancing?-basic failover -spill-over based -round robin -ratio
which of the following defines a host by its hardware address?-FQDN-Range-Host -MAC
What are the advantages of a WAN Failover solution? (Select all that apply)-Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port -directing redundant routes to one or more secondary service providers -configuring basic high availability-managing user authentication with sso
in the event logs, which of the following will generated a log message for any dropped packets?-the action for the policy is set to reset/drop-the firewall should not have droppes this traffic-the rule is set to allow the traffic-the policy type is firefox block policy
What do virtual Interfaces enable? -Remote management of company websites-providing public access to critical business services-controlling access to goups of services-functional segregation of business operations
Select th two methods used to register the sonicwall appliance.-Quick configuration setup guide-from MySonicwall.com -through the sonicOS web management interface
In a VPN policy, local and Peer IKE IDs are mandatory.True False
when configuring a destination address object for a VPN policy, which zone should it be applied to?-DMZ-WAN-LAN-VPN
what business purpose at an enterprise level is served by configuring zones? -extending public access to critical business services-providing public access to critical business services-controlling access to host resources-segregation of business operations
