Which message indicates IKE Phase 2 has completed successfully?
A. Quick Mode Complete
B. Aggressive Mode Complete
C. Main Mode Complete
D. IKE Mode Complete
Choose what BEST describes the reason why querying logs now is very fast.
A. New Smart-1 appliances double the physical memory install
B. Indexing Engine indexes logs for faster search results
C. SmartConsole now queries results directly from the Security Gateway
D. The amount of logs been store is less than the usual in older versions
When using LDAP as an authentication method for Identity Awareness, the query:
A. Requires client and server side software.
B. Prompts the user to enter credentials.
C. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security Gateway.
D. Is transparent, requiring no client or server side software, or client intervention.
Which directory holds the SmartLog index files by default?
A. $SMARTLOGDIR/data
B. $SMARTLOG/dir
C. $FWDIR/smartlog
D. $FWDIR/log
Where would an administrator enable Implied Rules logging?
A. In Smart Log Rules View
B. In SmartDashboard on each rule
C. In Global Properties under Firewall
D. In Global Properties under log and alert
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
A. 18210
B. 18184
C. 257
D. 18191
Which is a suitable command to check whether Drop Templates are activated or not?
A. fw ctl get int activate_drop_templates
B. fwaccel stat
C. fwaccel stats D. fw ctl templatesē¬
What are the steps to configure the HTTPS Inspection Policy?
A. Go to ManageandSettings > Blades > HTTPS Inspection > Configure in SmartDashboard
B. Go to Applicationandurl filtering blade > Advanced > Https Inspection > Policy
C. Go to ManageandSettings > Blades > HTTPS Inspection > Policy
D. Go to Applicationandurl filtering blade > Https Inspection > Policy
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _______ .
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
What is the purpose of a Stealth Rule?
A. A rule used to hide a server's IP address from the outside world.
B. A rule that allows administrators to access SmartDashboard from any device.
C. To drop any traffic destined for the firewall that is not otherwise explicitly allowed.
D. A rule at the end of your policy to drop any traffic that is not explicitly allowed.