SOPHOS
SOPHOS
You are preparing a hardware XG Firewall for installation on a remote site. The order
for the license has not yet been processed. Which registration option do you select in
the Initial Setup wizard?
I do not want to register now
You have created a repot that displays data that you wish to check on a daily basis.
how can you make this data easily available in the WebAdmin interface??
Create a bookmark for the report
One computer has a red health status. ON which 2 of the networks can the
endpoints be protected from the computer with a a red health status?
A. C
Which 2 features are required if you want to make use of lateral movement
protection?
Server or endpoint protection. Intercept X
Which XG firewall feature is able to block access to command and control servers?
Advanced Threat Protection
Which 2 methods are supported for logoff detection when using STAS
PING, Workstation Polling
Type the name of the only zone that cannot have a physical port or interface
assigned to it
Vpn
DHCP can be used to override the magic IP if the XG Firewall is not the default
gateway.
False
Which page list all current applications that are connecting through the XG Firewall?
Live connections
What do you need to do in order to use NTLM and Kerberos for web authentication?
Enable AD SSO per zone on the Device Access page
The XG firewall's life implementation of Cloud Access security Broker blocks all
cloud applications by default
False
Below Below is an image of the XG Firewall Control Center. From here, what would
you click to access the Policy Test Simulator
Log Viewer
The option to create loopback and reflexive Nat rules is only when adding NEW NAT
rule, not when editing an existing NAT rule.
True
Which 3 options should be configured to ensure the most secure scanning settings
are in place to protect users as they browse the web?
Malware scan mode: Batch, Engine Selection, Dual engine. Content : Block
Which deployment mode can protect web servers from common attacks?
Web Application Firewall
What 2 of the following are methods that can be used to allow access to a wireless
hotspot on the XG Firewall
Voucher, Password of the Day
Which metric can be used to identify risky users who are responding to speak
phishing attempts?
User Threat Quotient
You have configured one-time passwords. John Smith is trying to login to the User
Portal; his password is 'xgfirewall' Below you can see the login screen and his token
xgfirewall396145
Whre can an end user download the SSL VPN client from to install on their
workstation?
User Portal
Which of the following DoS and spoof protection modes will drop packets if the
source MAC address is not configured as a trusted MAC?
Mac filter
Which 2 of the following statements correctly describe how firewall rules are applied?
Packets that don't math a firewall rule are dropped and logged Packets are tested
against firewall rules in order and the first match is used
you are working with sensitive corporate data and want to ensure that traffic from
remote locations is monitored and blocked from leaving the corporate LAN. What
would be the most appropriate security mode to deploy the RED devices in
Standard/Unified
NAT rules require firewall rules to allow traffic
True
When creating a NAT rule which option allows you to select different source NATs
based on the outbound interface within a single rule?
Override source translation