Users may be authenticated sequentially to multiple authentication servers by configuring:
A.
An Authentication Profile.
B.
An Authentication Sequence.
C.
A custom Administrator Profile.
D.
Multiple RADIUS servers sharing a VSA configuration.
An Authentication Sequence.
WildFire analyzes files to determine whether or not they are malicious. When doing so,
WildFire will classify the file with an official verdict. This verdict is known as the WildFire
Analysis verdict. Choose the three correct classifications as a result of this analysis and
classification?
A.
Benign
B.
Adware
C.
Spyware
D.
Malware detection
E.
Safeware
F.
Grayware
Benign
Malware detection
Grayware
Which of the following is True of an application filter?
A.
An application filter automatically adapts when an application moves from one IP address to another.
B.
An application filter automatically includes a new application when one of the new
application’s characteristics are included in the filter.
C.
An application filter specifies the users allowed to access an application.
D.
An application filter is used by malware to evade detection by firewalls and anti-virus
software.
An application filter automatically includes a new application when one of the new
application’s characteristics are included in the filter.
Enabling "Highlight Unsused Rules" in the Security policy window will:
A.
Hightlight all rules that did not immmediately match traffic.
B.
Hightlight all rules that did not match traffic since the rule was created or since last
reboot of the firewall
C.
Allows the administrator to troubleshoot rules when a validation error occurs at the time
of commit.
D.
Allow the administrator to temporarily disable rules that do not match traffic, for testing
purposes
Hightlight all rules that did not match traffic since the rule was created or since last
reboot of the firewall
What option should be configured when using User-ID
A.
Enable User-ID per zone
B.
Enable User-ID per interface
C.
Enable User-ID per Security Policy
D.
None of the above
Enable User-ID per Security Policy
Page 3 out of 25 Pages |
Previous |