option
Questions
ayuda
daypo
search.php

SNSA7 sonicwall

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
SNSA7 sonicwall

Description:
SNSA 7 gen7 Sonicwall

Creation Date: 2025/03/12

Category: Others

Number of questions: 195

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

SLA Criteria is used to configured SD-WAN?. Latency. Jitter. Packet Loss. TCP.

Which SNMP version does SonicWall support? (ok). SNMPv1. SNMPv2. SNMPv3. All of above.

The Route Mode feature provides an alternative for NAT to route traffic between separete public IP address ranges? (ok). TRUE. FALSE.

The maximum number of entries for Split DNS. 32. 20. 64. 18.

DNS Rebinding?. DNS based attack on code embedded in web pages. DNS based attack.

Wich of the following DDNS Providers are supported in SonicOS? (ok). dyn.com. Changeip.com. No-IP.com. No dns.com.

Sonicwall DHCP servers options support standards as defined primarily in RFC 2131 and RFC 2132. (ok). TRUE. FALSE.

What type of mapping does ARP enable? (ok). IP Addresses to MAC Addresses. MAC Addresses to Domain Names. Does not enable any mapping. IP Addresses to Domain Names.

Which firewall network setting allows the current state of the DHCP leases in the network to be peridically written to Flash? (ok). Enable DHCP Server Persistence. Enable DHCP Server no Persistence.

SonicOS waits for a response from the LDAP server before timing out?. 10 sec. 20 sec. 60 sec. 90 sec.

The interface types supported by a SonicWall virtual firewall?. Virtual Interface. VPN Tunnel Interface. 4to6 Tunnel Inteface. Tunnel Inteface.

The SonicOS NSv scheme of interface addressing works in conjuction with Address objects, Services objects, Network zones. (ok). TRUE. FALSE.

Enable flow reporting feature is default?. TRUE. FALSE.

Which user authentication methods are available ina s SonicWall NSv? (ok). LDAP. RADIUS. Local Users. TACACS. CHAP.

SonicOS support multiples administrators?. TRUE. FALSE.

Modes Users ?. Full administrator (config). Full administrator (non-config). Read Only Administrator. Limited Administrator.

Static routes, by default, take precedence over VPN traffic. (ok). TRUE. FALSE.

Advanced Dynamic Routing - RIP. Used for small networks. Used for large networks. Network Speeds.

Advanced Dynamic Routing - OSPF. Used for small networks. Used for large networks. Network Speeds.

Advanced Dynamic Routing - Factors. Used for small networks. Used for large networks. Network Speeds / Interoperability / Complexity.

Advanced Dynamic Routing - RIPv2. Used for small networks. Supported by Advanced Routing mode / Supports VLSM /Authentication and Routing Updates. - Network Speeds / Interoperability / Complexity.

TOS routing applies to packet as the exit from the firewall? (ok). TRUE. FALSE.

Advanced Routing is enabled by default. (ok). TRUE. FALSE.

Which protocols are supported by the Advacend Routing Mode mode of SonicWall NSv? (ok). OSPFv3. RIP. RIPv2. IS-IS. EIGRP.

PSP is a - Path Selection Profiles (PSPs) - SDWAN. TRUE. FALSE.

Flow Reporting to local collector option is disabled by default?. TRUE. FALSE.

The Applow Monitor Panel information includes: Application , Users , Web Activity. Initiators , Responders, Threats. Voip, VPN, Devices. Contents. Polices.

LOG>System Logs are used to monitor and manage network activity in real time?. TRUE. FALSE.

A custom time interval can applied on log entries by default is 60 seconds?. TRUE. FALSE.

The export actions logs include: CSV. Text. Send EMail.

The logging level are: (VALIDAR). Emergency. Alert. Critical. Error. Warning. Notice. Inform. Debug.

LOG - The Alert Level include. Emergency. Alert (default). Critical. Error. Warning.

The default interval for Syslog message is 90 seconds, and 900 seconds for alter messages?. TRUE. FALSE.

As a general practice, all inbound connections should be logged? (ok). TRUE. FALSE.

Setting the Event Priority level lower than the Logging Level will cause those events to be filtered out from Event Logs? (ok). TRUE. FALSE.

If the Logging Level filter is defined as Error, which of the following alert messages will also be displayed in the results? (ok). Emergency. Alert. Critical. Notice. Warning.

Which feature is used to create a predefined email notification with a defined subject in firewall log management? (ok). Base Setup. Email Log Automation. Syslog. Name Resolution.

What type of information is displayed in the Device dashboard of the firewall? (ok). Security Services. System Usage. Network Interfaces. User Sessions. Ingress/Egress Bandwidth.

What are the features of Capture ATP? (ok). Available by default in SonicWall firewalls. License service. Cloud-based. Multi-engine and Multi-layer sandboxing. SMTP Encryption.

The Multi-Core Monitor displays dynamically updated statistics on the utilization of the individual cores of the SonicWall security appliance? (ok). TRUE. FALSE.

The real-time monitoring features of NSv rely on the flow-collection mechanisms to collect and display data. (ok). TRUE. FALSE.

The firewall can perform a rolling analysis of the event logs to show the most frequently accessed Web sites and the bandwidth use by IP Address or by Service. (ok). TRUE. FALSE.

The Connection Count monitor periodically updates the outgoing and incoming connection rates for each interface. (ok). TRUE. FALSE.

What type of information is displayed on the Protocol Monitor? (ok). Packet Rate. TCP Rate. ARP Rate. IPV4 Rate. HTTPS Connection.

Packet Monitor export?. Pcap. Libpcap. HTML. Text. App Data.

Packet Mirroring is the process of sending a copy of packets to another interface or to a remote SonicWall firewall. (ok). TRUE. FALSE.

Replayed packets are dropped before they can transmit through interfaces? (ok). TRUE. FALSE.

When creating a network probe policy, if the next hop gateway is not specified, the probe will assume that the targets are directly connected to the outbound interface's network ? (ok). TRUE. FALSE.

Which diagnostic tools test for the Default Gateway settings, DNS settings, as well as server connectivity for Mysonicwall, License Manager and Content Filter? (ok). Check Network Settings. CP Process Monitor. Connections Monitor. IPv6 Check Network Settings.

Which of the following are included in the output of a network monitor? (ok). Packet Types. Probe Type. IP version. Interface. Probe Target. Threat Statistics.

What type of intermediate traffic is monitored by the Packet Monitor? (ok). IP Helper-generate packets. Expired packets. Encrypted packets. Multicast packets that are replicated. Exported packets.

What export formats are available for a snapshot of the Packet Monitor? (ok). Pcap. Plain Text. HMTL. XML. Excel Chart.

Whick packet status are indicated by the Packet Monitor? (ok). Forwarded. Consumed. Dropped. Exported. Imported.

In SonicOS 7.0 the default access rules cannot be overridden by the custom access rules.(ok). TRUE. FALSE.

Which of the following statements apply for the network access rule in SonicOs 7.0? (Select all that apply) (ok). The Default Access Rule does not allow traffic from Public security zones to Trusted security zones. The Default Access Rule allow traffic inbound from the Internet to the internal network. The Custom Access Rule can be configured only for inbound traffic. The Default Access Rule allow traffic outbound to the Internet.

A company wants to offer an online shopping experience to its customers. What are the two important configuration settings required to address this business requirement so that the customers can access the internal server securely? (Select all that apply) (ok). Configure an Access Rule. Configure the NAT Rule. Enable GAV and IPS. Enable SSL/TLS server inspection in the WAN zone. Enable the content filtering service.

In an inbound NAT Rule, the original source IP address will invariably be a public IP address, which you do not need to translate. To keep the original source IP as-is, define the Translated Source as ______________. (ok). Original. Any. The IP address of the Gateway. The IP address of the destination server Gateway.

What type of NAT policy needs to be configured to allow a group of internal IP addresses to map to another group of IP addresses? (ok). One-to-many. Many-to-one. Many-to-many. One-to-one.

Which Sonicwall application should be installed to deploy the Sonicwall? SSO agent for transparent authentication? (ok). Sonicwall Virtual Appliance Application. Sonicwall Directory Connector Application. Sonicwall NetExtender Application. Sonicwall GVC client Application.

What actions are supported in SonicOS CFS 4.0 service? (Select all that apply) (ok). BWM. Deny. Passphrase. Confirm.

CFS policies in CFS 4.0 follow a priority defined by the order set on the Content Filter page. (ok). TRUE. FALSE.

What best practices should be followed when configuring the CFS policy? (Select all that apply) (ok). The lower priority should be assigned to generic policies that apply to a broader set of users. The lowest priority should be assigned to specific/granular policies. The highest priority should be assigned to specific/granular policies. The highest priority should be assigned to generic policies that apply to a broader set of users.

Sonicwall Geo-IP Filter works by tracing a ___________to a particular country. (ok). Public IP. Domain Name. Private IP. Public DNS Server.

Match the security features with their descriptions: Capture ATP (ok). Discover and stop Zero-day and other unknown attacks. Effective security analytics o every bit of traffic in real time without addead latency. Protect Internet communications by encrypting the traffic. Granular web polices to restrict objectinable, unproductivem, or unsecure web content.

Match the security features with their descriptions: RFDPI (ok). Discover and stop Zero-day and other unknown attacks. Effective security analytics o every bit of traffic in real time without addead latency. Protect Internet communications by encrypting the traffic. Granular web polices to restrict objectinable, unproductivem, or unsecure web content.

Match the security features with their descriptions: TLS (ok). Discover and stop Zero-day and other unknown attacks. Effective security analytics o every bit of traffic in real time without addead latency. Protect Internet communications by encrypting the traffic. Granular web polices to restrict objectinable, unproductivem, or unsecure web content.

Match the security features with their descriptions: Content Filtering (ok). Discover and stop Zero-day and other unknown attacks. Effective security analytics o every bit of traffic in real time without addead latency. Protect Internet communications by encrypting the traffic. Granular web polices to restrict objectinable, unproductivem, or unsecure web content.

SonicOS 7´s modern and intuitive user interface features intelligent device dashboards with actionable alerts, redesigned topologies, and simplified policy creation an managemnet. (ok). TRUE. FALSE.

An administrator can be logged of when pre-empted by another administrator or can be drooped into a non-config mode (ok). TRUE. FALSE.

SonicWall firewalls can inter operate whit any X509v3 certificates issued by 3rd party CA authorities? (ok). TRUE. FALSE.

You can back up Firmware automatically in a recurring mode to your local server. (ok). TRUE. FALSE.

Which feature is used to ensure the firewall licenses are the same as in the respective MysonicWall.com account? (ok). Synchronize. Enter Keyset. Generate Security Services Summary. Manual Upgrade.

What options are used to preempt an administrator logged into the firewall? (ok). Change to read-only access. Both administrators can manage simultaneously. Log out. Drop into Non-Config mode.

What are some of the key features of SonicWall Next-Gen firewalls? (ok). Operational complexity. Flexible deployment. Network segmentation. Application intelligence and control. Single-layer securiyt system.

What are some of the key features of SonicOs 7 architecture? (ok). Esy, zero-touch deployment. Operational complexibility. Simplified integration. Advanced protection against ecrypted threats. TLS 1.2. TLS 1.3.

Select two best practices that should be implemented before updating the firewall firmware. (ok). Use the create backup option built into the firewall. Download a settings file locally. Import a settings files. Disable th cloud backup option.

Configure the SonicWall Gen7 NSv firewall, using the following quick configuration Wizards (ok). Public Server Guide. VPN Guide. SD-Wan Guide. Content Filter.

Which local encryption cipher is selected by default in the security settings of SonicWall VPN? (ok). 3DES. AES-128. DES. AES-256.

What is the maximum numbers of SD-WAN Interface Group Members? (ok). 10. 15. 20. 30.

The Public Server guide assigns the server automatically to the zone to which the IP address belongs. (ok). TRUE. FALSE.

When configuring a site to site policy, the LOCAL NETWORK option must match the DESTINATION NETWORK on the other side of the tunnel, in order to avoid tunnel negotiation errors or failure. (ok). TRUE. FALSE.

Which is the followings is the default public server type? (ok). FTP Server. Terminal Services Server. Mail server. Web server.

What is the default Ip version setting for sending ou receiving the DNS Proxy packets between the firewall and the DNS servers? (ok). IPV4. IPV6. IPv4 to IPv4. IPv4 to IPv6.

Which feature is a messaging protocol that is used to build a cache of dynamic entries for IPv6 devices on the firewall? (ok). Neighbor Discovery. ARP. MAC IP Anti Spoof. Web Proxy. VLAN Translation. IP Helper.

Which feature prevents ARP poisoning of connected machines? (ok). ARP Watch. Anti-Spoof Cache. ARP Lock. DHCP Relay.

How many web proxy servers can be configured in the SonicWall firewall? (ok). 32. 10. 16. 48.

Which advanced network interface setting on the SoniWall NSv firewall allows initial packets or response packets to pass through other interfaces. (ok). Enable Flow Reporting. Enable Asymmetric Route Support. Enable Multicast Support.

Which user authentication method provides centralized Authentication, Authorization and Accounting? (ok). LDAP. RADIUS. Local Users.

Which authentication method is recommended for a relatively smaller number of users? (ok). LDAP. Local Users. RADIUS.

Match the user authentication methods with their respective features: Local User Database (ok). Suitable for a relatively small number of users. Provides centralized Authentication, Authorization and Accounting management for users. Scalable user-authentication method.

Match the user authentication methods with their respective features: RADIUS (ok). Suitable for a relatively small number of users. Provides centralized Authentication, Authorization and Accounting management for users. Scalable user-authentication method.

Match the user authentication methods with their respective features: LDAP (ok). Suitable for a relatively small number of users. Provides centralized Authentication, Authorization and Accounting management for users. Scalable user-authentication method.

Each group has a default permission level, but a user with administrator rights can create and modify any user groups and configure custom group permissions. (ok). TRUE. FALSE.

The default guest profile cannot be deleted. (ok). TRUE. FALSE.

Who among the following can manage Guest Accounts and Sessions? (ok). Guest Administrators. SSL-VPN Administrators. Content Filter Administrators. Zone Administrators.

Which routing feature, when enabled, suppresses the inclusion of routes sent in updates to routers from which they were learned?. Trusted Users. Everyone. Local Users.

Which routing feature, when enabled, suppresses the inclusion of routes sent in updates to routers from which they were learned? (ok). Split Horizon. ARP Watch.

Match the Live Monitors with the type of data they display: Multi-Core Monitor (ok). Utilization of the individual cores of the firewalls. frequently used application. rate of each interface connection. bandwidth traffic and the respective Packet Rate.

Match the Live Monitors with the type of data they display: Applications Bandwith (ok). Utilization of the individual cores of the firewalls. frequently used application. rate of each interface connection. bandwidth traffic and the respective Packet Rate.

Match the Live Monitors with the type of data they display: Interface Usage (ok). Utilization of the individual cores of the firewalls. frequently used application. rate of each interface connection. bandwidth traffic and the respective Packet Rate.

What type of intermediate traffic is monitored by the Packet Monitor?. Encrypted packets. Multicast packets that are are replicated. IP helper-generated packets.

Sonicwall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities. (ok). TRUE. FALSE.

Match the Capture Client features to the endpoint security benefits they deliver: Continuous behavioral monitoring (ok). Protects against both file-based and fileless malware and delivers a 360-degree attack view with actionavle intelligence. Reduces the footprint and overheads od cost and management. Removes the threat completely and restores a targeted client to its original state, before malware activity has even started.

Match the Capture Client features to the endpoint security benefits they deliver: Cloud-based managemnent console (ok). Protects against both file-based and fileless malware and delivers a 360-degree attack view with actionavle intelligence. Reduces the footprint and overheads od cost and management. Removes the threat completely and restores a targeted client to its original state, before malware activity has even started.

Match the Capture Client features to the endpoint security benefits they deliver: Roolback capability (ok). Protects against both file-based and fileless malware and delivers a 360-degree attack view with actionavle intelligence. Reduces the footprint and overheads od cost and management. Removes the threat completely and restores a targeted client to its original state, before malware activity has even started.

Captue Client facilitates multi-tenant mangement ? (ok). TRUE. FALSE.

Which feature protects against both file-based and file-less malware and delivers a 360-degree attack view with actionable intelligence relevant for investigations? (ok). Continuous Bahavioral Monitoring. Content Filtering. Roolback. Application Vulnerability Intelligence.

Application vulnerability intelligence helps catalog every application on each protected endpoint? (ok). TRUE. FALSE.

Policy inheritance refers to the ability of a policy at a child scope to bem automatically inherited from the policy of the parent scope? (ok). TRUE. FALSE.

What challenges do customers face in effective and secure firewall management? (ok). Firewall silos. Onbording devices. Monitoring risks. Management complexity. Surplus of IT Talent. Fast response.

Sonicwall NSM offers unified firewall management to orchestrate, automate, and monitor firewall security in all enviroments (ok). TRUE. FALSE.

Match the features of NSM with their respective descriptions: Role-based Access Control (ok). Assign varying levels of firewall management access. Compare the configuration of a device or devices across groups. Automate management tasks. Replicate settings or configuration across tenants.

Match the features of NSM with their respective descriptions: Config Audit (ok). Assign varying levels of firewall management access. Compare the configuration of a device or devices across groups. Automate management tasks. Replicate settings or configuration across tenants.

Match the features of NSM with their respective descriptions: RestFul APIs (ok). Assign varying levels of firewall management access. Compare the configuration of a device or devices across groups. Automate management tasks. Replicate settings or configuration across tenants.

Match the features of NSM with their respective descriptions: Templates (ok). Assign varying levels of firewall management access. Compare the configuration of a device or devices across groups. Automate management tasks. Replicate settings or configuration across tenants.

NSM architecture allows you to scale up to ____ devices under management? (ok). 10.000. 1.000. 100.

Access to the NSM can by limited by _____ source IP adddresses? (ok). Whitelisting. Blacklisting. Blacklisting and Whitelisting. Greylisting.

NSM On-Prem offers large-scale centralized management of SonicWall Gen 7 devices only? (ok). TRUE. FALSE.

The NSM Closed Network Support feature is ideal for customers who run: (ok). One or more private networks that are completely shut off from the outside environment. One or more open networks that are completely shut off from he outside environment. One or more private networks that are open the outside environment. One or more open networks that are open the outside environment.

Which feature is designed to prevent unauthorizes access to the NSM environment by disabling the user account if incorrect passwords are entered after a specidied number of failed attempts, during a given period? (ok). Account Lockout. Privileges. Keyset. Authenticator.

NSM on-prem requires a separate licenses for reporting and analytics? (ok). TRUE. FALSE.

TOTP can retrieve the one-time password from the authenticator APP when there is no Internet connection?. TRUE. FALSE.

Three methods acessing CLI ?. Serial Console via console port. SSH Management Session via Ethernet (Putty). SSH Terminal Session within GUI.

Which feature of Capture Client feature eliminates the effort of manual restoration of the targeted client in case of ransomware or similar attacks?. Unique Rollback Capabilities. Endpoint Network Control. Application Vulnerability Intelligence. Continuous Behavioral Monitoring of the client.

What are the two ways of installing the SonicWALL Capture Client utility on a target workstation?. Implementing Client Enforcement. Downloading the client from Mysonicwall and installing it on the client PC. Enforcing content filtering. Enabling stateful failover.

Which feature of SonicwALL Capture Client automatically uploads suspicious files for advanced analysis?. Integration with Capture ATP. Rollback Capabilities. Continuous behavioral monitoring of the client.

What are the key features and benefits of integrating Capture Client with Sonicwal firewalls?. Network Threat Alerts. Packet Monitoring and Mirroring. Endpoint Security Enforcement. User Visibility and Single Sign-On.

What benefits are offered by SonicWALL Capture Client Service?. Continuous Behavioral Monitoring of the client. Anti-Spam Service. Integrated troubleshooting tool. Capture Advanced Threat Protection. Application Vulnerability Intelligence.

The Sonicwall DPI-SSL certificate can be pushed using Capture Client?. TRUE. FALSE.

What is the best method of authetication so that organizations can counteract ever-increasing password breaches and the relevant credentialed cyber attacks?. Preshared Key Authentication. Singe Sign-On Authentication. Two-Factor Authentication. Biometric Authentication.

The random password generated by SonicWALL 2FA is multi-use and is not deleted when the user is successfully granted access to the resources?. TRUE. FALSE.

What is default SMTP port used by SonicWALL to send the generated one-time password to the user, when using OTP via Mail?. 443. 25. 587.

You can use the Google Authentication to retrieve the Time-Based One-Time Password. TRUE. FALSE.

What are the benefits of using SonicWALL Command Line Interface?. You can create a CLO script for automating configuration tasks. It provides a faster and efficient way to configure and manage SonicwALL firewall. It helps to complete configuration tasks when the SonicOS web-based management UI is not acessible. The settings file of the SonicOS can be imported/exported only through the CLI mode.

What command is used to create a backup of the current configuration on the firewall. local-backup. create-backup-local. backup-configuration.

In SonicOS CLI, the ______ command is used to quickly recover the firewall from the uncertain configuration state?. restore-default. safemode. configure. commit.

In SonicOS CLI, the _______ command is used to export the settings file to troubleshoot the issues related to the firewall. copy. export. write. export-troubleshooting.

Which of the following should be implemented when configuring SonicWALL firewall interfaces?. Enable "Add rule to redirect HTTP to HTTPS" option for betther mangement. The default WAN interface should either be assigned a valid non-zero IP address or configured for DHCP or PPPoE. Never configure any WAN zone interface on the firewall and the leave it disconnected. The "Add rule to redirect HTTP to HTTPS" option should be disabled.

CLI can be used. CLI can be used in scripts to automate tasks. Use CLI to manage the firewal when GUI is unavailable. Debug or manage the firewall,. Manage the appliance in the cloud.

The HA pair do not share licenses after the appliances are associated in MysonicWALL. You need separate license subscriptions for each HA unit?. TRUE. FALSE.

Identify the best practices related to SonicOS firewall network configuration. In order to allow trusted users to manage from the WAN zone, you should create an access rule for the specific group. Disable the "Ignore Don´t FragmentDF Bit" setting in network inteface settings. Enable the"Ignore Don´t Fragment (DF) bit" feature. Disable Load Balancing when there is only one WAN Interface.

What does the Stealth Mode feature result in?. This allows the firewall to inspect all traffic. Firewall stops responding to all requests. Firewall does not respond to blocked inbound connections.

As a best practice for preventing ransomware, which of the following CFS categories should be blocked?. 28. Hacking/Proxy Avoidance Systems. 31. Web Communication. 33. News and Media. 59. Malware. 64. Not Rated.

Which of the following statements are applicable to the "Allow Fragmented Packets" option when configuring a firewall acess rule ?. If the option is disabled, traffic may suffer from disruptions and throughput issues. If the option is selected, larg IP packets are divides into fragments before they are routed over the internet. The option is enabled by default. If the option is selected, the packets will be fragmented and then reassembled on the destination host. If the option is selected, the packets will be fragmented and then reassembled on the intermediate devices.

Selected all the methods of accessing SonicOS CLI. Console Port. SSH connection via SonicOS GUI. SSH connection through SSH client. None of above.

Which feature allows for the automatic upload os suspicious files on Windows device for advanced analysis?. Threat Hunting and Response. Endpoint Network Control. Capture ATP.

Extensions format imported DPI-SSL is ."p12" or ".pfx" ?. TRUE. FALSE.

Capture Client can work independently, or it can work with SonicWALL Firewall ?. TRUE. FALSE.

Capture Client with SentinelOne, a next-generation malware protection engine delivers advanced threat protection ?. TRUE. FALSE.

In Capture Client, "Continuous Behavioral Monitoring" ... Helps see complete profiles of a file, application, process, and network activity. Protects against both file-based and fileless malware and delivers a 360-degree attack view with actionable intelligence.

In Capture Cliente, "Threat Hunting with Deep Visibility" ... Searches for threats based on behavior indicators and Indicators of Compromisse (IOC) across covered Windows, MAC and Linux devices. You can automate Threat Hunting and Response, with custom Rules and Alerts.

In Caputure Client, "Capture Advanced Threat Protection" ... allows automatic upload of suspicious files on Windows device for advanced sandboxing analytics. finds dormant threats such as malware before execution with built-in-timing delays,. references Capture ATPs databse of dile veridicts without the need to upload files to the cloud.

In Capture Client," Application Vulnerability Intelligence"... Helps catalog every installed application and any asociated risk. Examines known vulnerabililities with details of the Common Vulnerabilities and Exposures or CVEs. Uses this data to priorize patching, and reduce the attack surface.

Features and Benefits of Capture Client?. Continuous Behavioral Monitoring. Threat Hunting with Deep Visibility. Capture Advanced Threat Protection. Application Vulnerability Intelligence.

Assigned interface modes for X0?. Static IP Mode. Transparent IP Mode. Layer 2 Bride Mode. Tap Mode. Wired Mode. IP Unnumbered. Static One Arm Mode. DHCP.

Assigned interface modes for X1?. Static. DHCP. PPPoE. L2TP. Tap Mode. Wire Mode. Static One Arm Mode. DHCP One Arm Mode.

What are the types of Address Objects?. Host. Range. Network. MAC. FQDN.

GAV Protocols. HTTP. DNS. FTP. IMAP. SMTP. POP3. CIFS NETBIOS. TCP STREAM.

The flag " Disable detection of EICAR test virus" is enabled by default?. TRUE. FALSE.

What are the Advanced Threat Protection mechanisms?. Capture ATP. GeoIP Filter. Botnet Filter.

What types of files are analyzed by Capture ATP?. Executables (PE, Mach-O, and DMG). PDF. Office 97-2003 (docx, xlsx, etc). Archives (jar, apk, rar, bz2, bzip2, 7z, xz, gz and zip). Wav, Mp3.

File sent to Capture ATP Cloud Service for Analysis?. Allow file download while awaiting a verdict. Block file download until a verdict is returned.

Bandwidth Aggregation Method is. Per Policy Method - limited specified in a policy. Per Action - limit action is applied.

Load Balancing Types. Basic Failover. Round Robin. Spil-over. Ratio.

SD-WAN SLA Probe. Ping-Explict Route. TCP-Explict Route (default).

To packet size (MTU)) that a WAN interface is: Standard Packets : 1500(default) and Jumbo Frame is 9000 ?. TRUE. FALSE.

Is the "Ignore Don’t Fragment (DF) bit" flag enabled by default?. TRUE. FALSE.

Is the "Do not send ICMP Fragmentation Needed for outbound packets over the Interface MTU" flag enabled by default?. TRUE. FALSE.

Is the "Use Routed Mode - Add NAT Policy to prevent outbound\inbound translation" flag enabled by default?. TRUE. FALSE.

Types Probe Target for SD-WAN?. ICMP. TCP. UDP.

Path Selection Profiles (PSPs) - determine the network paths or interfaces that satisfy a specific network SLA criteria from a pool (SD-WAN Group) of available network paths/interfaces?. TRUE. FALSE.

If all three of these features are configured on an appliance, the following order of precedence is followed in the case of a link failure: 1. Port Redundancy 2. HA 3. LB Group. TRUE. FALSE.

Enable Load Balancing. This option is selected by default ?. TRUE. FALSE.

Match the Quick Configuration Guide options with the tasks that they enable: Public Server (ok). Provides public access to an internal server. Configuring a new site-to-site policy. Configuring software-based control over the Internet.

Match the Quick Configuration Guide options with the tasks that they enable: VPN (ok). Provides public access to an internal server. Configuring a new site-to-site policy. Configuring software-based control over the Internet.

Match the Quick Configuration Guide options with the tasks that they enable: SD-WAN (ok). Provides public access to an internal server. Configuring a new site-to-site policy. Configuring software-based control over the Internet.

Which of the following are the default user groups to which a new user is automatically added in a SonicWall firewall? (ok). All Users. Guest Services. Trusted Users. Everyone.

Which of the following variables are used to configure static routes to forward traffic? (ok). Interfaces. Services. Encryption Polices. Zones.

Which highlighted option is used to configure the event log attributes globally, using flexible match conditions? (ok). Filter. Priority. Go To Configure Log.

If a user attempts to access a website that has been blocked by an organizational content filter rule, what type of default notification will the firewall trigger after logging the event in real-time? (ok). Inform. Debug. Alert.

Match the following log types with their contents: System logs (ok). All network and user activity in real-time. Active inbound and outbound connections. Information about incoming and outgoing data packets in real-time. All the configuration changes performed by an administrator.

Match the following log types with their contents: Connections (ok). All network and user activity in real-time. Active inbound and outbound connections. Information about incoming and outgoing data packets in real-time. All the configuration changes performed by an administrator.

Match the following log types with their contents: Applow Monitor (ok). All network and user activity in real-time. Active inbound and outbound connections. Information about incoming and outgoing data packets in real-time. All the configuration changes performed by an administrator.

Match the following log types with their contents: Auditing Logs (ok). All network and user activity in real-time. Active inbound and outbound connections. Information about incoming and outgoing data packets in real-time. All the configuration changes performed by an administrator.

Which Log Settings option is used to create a predefined email notification with a defined subject in firewall log management? (ok). Base Setup. Email Log Automation. Syslog. Name Resolution.

Match the Live Monitors with the type of data they display: Connection Rate (ok). Utilization of the individual cores of the firewalls. frequently used application. rate of each interface connection. bandwidth traffic and the respective Packet Rate.

Which of the following are available in with the Basic Capture Client license? (ok). Integration with Capture Client. Rollback Capability. Role-based access control. Integration with Capture Security Center. Windows Server Support.

Match the user authentication methods with their respective feature: Advanced static analysis (ok). Scan files, model attributes, or indicators, to classify files as benign, suspicious, or threats. Removes the threat completely and restores a targeted client to its original state. Blocks potentially infected devices from connecting to the endpoint with the help of granular whitelisting polices.

Match the user authentication methods with their respective feature: Rollback (ok). Scan files, model attributes, or indicators, to classify files as benign, suspicious, or threats. Removes the threat completely and restores a targeted client to its original state. Blocks potentially infected devices from connecting to the endpoint with the help of granular whitelisting polices.

Match the user authentication methods with their respective feature: Device Control (ok). Scan files, model attributes, or indicators, to classify files as benign, suspicious, or threats. Removes the threat completely and restores a targeted client to its original state. Blocks potentially infected devices from connecting to the endpoint with the help of granular whitelisting polices.

Golden SonicOSX template is not supported on NSM? (ok). TRUE. FALSE.

How would you categorize the new features unified policy management support and multi-device firmware upgrade? (ok). Deployment flexibility. Hardware Supports Expansion. Secure Improvements. Usability Enhancements.

Keep Alive should be enable on the firewall with the most processing overhead? (ok). TRUE. FALSE.

The default session time an administrator can be logged in to the firewall is? (ok). 5 minutes. 10 minutes.

Which of the following variables are used to configure static routes to forward traffic? (Select all that apply) (ok). Interfaces. Services. Objects.

Report abuse