Match the network device with the correct User-ID technology.
Solution:
Microsoft Exchange – Server monitoring Linux authentication – syslog monitoring Windows Client – client probing
Citrix client – Terminal Services agent
Does this meet the goal?
Correct Answer:
A
Which rule type is appropriate for matching traffic both within and between the source and destination zones?
Correct Answer:
A
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
Correct Answer:
C
An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?
Correct Answer:
A
Based on the screenshot what is the purpose of the included groups?
Correct Answer:
B