What is the purpose of a Stealth Rule?
Correct Answer:
C
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
Correct Answer:
C
Configure Spoof Tracking - select the tracking action that is done when spoofed packets are detected:
R80.10 management server can manage gateways with which versions installed?
Correct Answer:
B
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the _______ algorithm.
Correct Answer:
A
What is the SOLR database for?
Correct Answer:
A