In a Routed Deployment with NAT configuration, which entry must be configured to hide private network addresses?
A. Destination NAT
B. Source NAT
C. Base NAT
D. Target NAT
Which group of filters is static?
A. Games, Music, Video, RD
B. Games, P2P, Remote Access, Tunneling
C. Games, P2P Music, Flash
D. Games, Music, Video, Tunneling
Refer to the exhibit.
Which traffic is permitted to the Internal zone without any firewall rules configured?
A. All HTTP traffic input to the Internal zone is permitted.
B. Any IP traffic input to the Internal zone destined to any other interfaces is permitted.
C. Any IP traffic input to the Internal zone is permitted.
D. Some of the IP traffic input to the Internal zone is permitted.
Under which circumstance can traffic pass between security zones?
A. Traffic can always pass between security zones.
B. When an explicit policy allowing traffic between security zones is defined.
C. When you create application groups.
D. By default, traffic can pass between security zones.
Due to security issues, the company HR website needs to function on non-standard port 272.
Where this should be configured in the LSM?
A. On the Firewall > Services > Policy, check the box next to http, then click Edit. Add 272 to the service, click OK and then Commit Changes.
B. On the Firewall > Policy > Services, check the box next to https, then click Edit. Add 272 to the service, click OK and then Commit Changes.
C. On the Firewall > Policy > Services, check the box next to http, then click Edit. Add 80 to the service, click OK and then Commit Changes.
D. On the Firewall > Policy > Services, check the box next to http, then click Edit. Add 272 to the service, click OK and then Commit Changes.
Which CLI command can be used to determine how well the HP TippingPoint NGFW is handling traffic?
A. Show np traffic
B. Show np general statistics C. Show np details
D. Show np statistics
To use a secure method of retrieving events from the device, which SMS option should you choose?
A. Alert Channel
B. Notify Channel
C. Activate Channel
D. Inform Channel
Which protocol creates a complete database of the network topology prior to calculating the optimal route?
A. OSPF
B. PIM
C. RIP
D. LDAP
When you configure the NGFW appliance in transparent firewall mode, which configuration is mandatory?
A. Bridge Group(s)
B. Static routes
C. NAT
D. Dynamic MAC address learning
How does ThreatLinQ relate to DVLabs Security intelligence?
A. Filters malicious/dirty traffic with input on what should be filtered from DVLabs and the related services
B. Collects vulnerabilities from researchers on all major software applications and operating systems
C. Partners with leading threat research organizations such as SANS and CERT
D. Collects data from thousands of customers around the globe to detect global outbreaks in real-time