100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SONICWALL SNSA - 2021

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
18-11-2022
Written in
2022/2023

SONICWALL SNSA – 2021 exam with correct answers wers A customer has an established base of GVC VPN users with a WAN GroupVPN policy configured. The customer wants to begin an implementation for SSL VPN users. The existing group of GVC VPN users must be converted to SSL VPN users because the SonicWALL security appliance does not support both types of VPN users. - correct ansers --FALSE SSL VPN eliminates the need for remote access authentication. - correct ansers --FALSE Which of the following correctly describes how a bandwidth management rule works? -Can be configured for all VPN traffic -Only applies to outbound traffic from the firewall to the WAN or any other destination -Can be configured only for individual VPN Security Associations -Only applies to inbound traffic from the WAN to the firewall - correct ansers --Can be configured for all VPN traffic What are the benefits provided by a VPN (select all that apply)? -Securely connects distributed networks together -Prevents denial-of-service attacks on remote connections -Enables a remote connection to the LAN via the Internet -Assures remote clients have up-to-date anti-virus software -Provides data confidentiality and sender authentication - correct ansers ---Securely connects distributed networks together -Enables a remote connection to the LAN via the Internet -Provides data confidentiality and sender authentication What benefits are provided by a VPN (select all that apply)? -Reporting -Increased capacity -Scalability -Encryption -Security - correct ansers ---Scalability -Encryption -Security Which of the following is the most basic firewall technology? -Packet filtering -Single firewall -Deep packet inspection -Application proxies - correct ansers ---Packet filtering The default firewall access rule allows all communication from the LAN to the Internet. -True -False - correct ansers ---True What are two advantages of a multiple firewall? -Protects restricted special resources -Offers protection from external attacks while each network segment has free access to other segments -Helps protect entire departments - correct ansers --What are two advantages of a multiple firewall? -Protects restricted special resources What is the purpose of a security policy? -To authenticate the process by which users and devices are identified and granted access to the network -To monitor the network security and make sure the firewall is configured properly to prevent inappropriate usage -To make it more difficult for hackers to locate a security hole in a network's gateway -To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk - correct ansers ---To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk What question would you ask to get specific information on user restrictions? -What kinds of network traffic will you allow? -Will the computers be locked away from the public, or will they have access to the hardware? -Will users be allowed to login at any time, from any location, to any machine? -Who should be allowed to access your services? - correct ansers ---Will users be allowed to login at any time, from any location, to any machine? Content Filtering Services applies to which of the following traffic protocols? (Select all that apply.) -HTTPS -FTP -HTTP -Email attachments - correct ansers ---HTTP -HTTPS If the appliance loses connection to the SonicWALL site rating library: (Select all that apply.) -CFS blocks all web traffic (based on configuration) -CFS continues to operate using the last ratings seen -CFS allows all web traffic (based on configuration) -CFS must use its internal logic to identify which traffic to block - correct ansers ---CFS blocks all web traffic (based on configuration) -CFS allows all web traffic (based on configuration) With SonicWALL CFS, network administrators have a flexible tool to provide comprehensive filtering based on which of the following? (Select all that apply.) -Allowed domain designations -Time of day -SMTP -Keywords -LDAP Groups -Forbidden domain designations -FTP - correct ansers ---Allowed domain designations -Time of day -Keywords -Forbidden domain designations The default CFS policy when assigned "Via Users and Zones Screens" should be the most restrictive. -True -False - correct ansers --True The SonicWALL Log can be exported in the following formats: (Choose all that apply) -Log View -Comma-separated value (CSV) -Tab Delimited -Plain text - correct ansers ---Comma-separated value (CSV) -Plain text Which SonicWALL security services use the Deep Packet Inspection engine? (Select all that apply) -IPS -Anti-Spyware -GVC -GAV -CFS - correct ansers ---IPS -Anti-Spyware -GAV -CFS A SonicWALL security appliance configured with Gateway Anti-Virus verifies and enforces the Desktop Anti-Virus client to the downstream workstation. -True -False - correct ansers ---False The SonicWALL GAV engine can perform base64 decoding without ever reassembling the entire base64 encoded email stream. -True -False - correct ansers ---True When you select "Prevent All" in the IPS Global Settings of the SonicWALL security appliance for High Priority Attacks, this allows all blocked attacks to be entered into the Log file of the security appliance. -True -False - correct ansers ---False SonicWALL GAV includes advanced decompression technology that can automatically decompress and scan files on a per packet basis to search for viruses and malware. -True -False - correct ansers ---True The SonicWALL security appliance maintains an Event log for tracking potential security threats. -True -False - correct ansers ---True Which Security Services of the SonicWALL security appliance use the SonicWALL Deep Packet Inspection engine? -IPS, GAV, Anti-Spyware, and Viewpoint -IPS, Anti-Spyware, Content Filtering -IPS, GAV, and Anti-Spyware -Global VPN Client - correct ansers ---IPS, GAV, and Anti-Spyware In order for SonicWALL's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and/or Gateway Anti-Spyware be configured? -Firewall rules -Enforced in the Zones and enabled in security services -Address objects -Zones -NAT policies and firewall rules - correct ansers ---Zones Which of the following LB/Failover methods would be selected if an administrator wanted to specify how much outbound traffic is sent through the primary and secondary WAN interfaces? -Active/Passive -Ratio based -Round Robin -Spill-Over based - correct ansers ---Ratio based How does the SonicWALL maintain persistence with outbound load balancing? -SSL Session ID -Source IP and Destination IP -Source and Destination Port -Session Cookies - correct ansers ---Source IP and Destination IP One requirement of WAN ISP Failover and Load balancing is? -Twin-ax cables -Standard OS -A second ISP connection -Cross-Over cable - correct ansers ---A second ISP connection When WAN failover occurs, the firewall re-establishes all sessions using the new WAN interface with no traffic interruption thanks to the stored and tracked session states. -True -False - correct ansers ---False Besides Probe Monitoring, one requirement of WAN ISP Failover and Load balancing is? -Static IP Addresses on both WAN Interfaces -Twin-ax cables -Available Interface that can be configured as a secondary WAN -Standard OS - correct ansers ---Available Interface that can be configured as a secondary WAN The Company's security policy is to only allow WWW browsing by all internal users; no other internet traffic is permitted. Assuming that you are allowing DNS, what are the "Best Practices" firewall rules to accomplish this. Assume the following column headings: (Select the one best answer) --LAN > WAN(Intersection) - Any(Source) - Any(Destination) - HTTP(Service) - Allow(Action) - All(Users) --WAN > LAN(Intersection) - Any(Source) - Any(Destination) - DNS(Service) - Allow(Action) - All(Users) --WAN > WAN(Intersection) - Any(Source) - Any(Destination) - Any(Service) - Deny(Action) - All(Users) --LAN > WAN(Intersection) - Any(Source) - Any(Destination) - Any(Service) - Allow(Action) - All(Users) --WAN > LAN(Intersection) - Any(Source) - Any(Destination) - HTTP(Service) - Allow(Action) - All(Users) - correct ansers ----LAN > WAN(Intersection) - Any(Source) - Any(Destination) - HTTP(Service) - Allow(Action) - All(Users) Which of the following configurations takes precedence? -Private NAT rules on DMZ -Outbound WAN Load Balancing -Global Public NAT rules -Outbound Policy Based Route - correct ansers ---Outbound WAN Load Balancing Which of the following LB/Failover methods allows an administrator to specify a threshold at which traffic is also sent out of the secondary WAN Interface? -Spill-Over based -Percentage based -Round Robin -Active/Passive - correct ansers ---Spill-Over based Check Network Settings is a diagnostic tool which automatically checks the network connectivity and service availability of several pre-defined functional areas of SonicOS, returns the results, and attempts to describe the causes if any exceptions are detected. -True -False - correct ansers ---True The default factory behavior of a SonicOS appliance is to allow all traffic from the LAN and block all traffic from the WAN. -True -False - correct ansers ---True Before you upgrade firmware, you should save some backups and documentation, so that you are prepared to recover easily if something goes wrong. -True -False - correct ansers ---True Which of the following is NOT a valid System boot option: -Uploaded Firmware -New Firmware -Current Firmware -Current Firmware with Factory Defaults - correct ansers ---New Firmware For any model, when having problems with synchronization with the licensing information, you can try a method which involves a button on the _____ page which resets the firewall's licensing. - - - - - correct ansers --- The default IP Address for a SonicOS appliance booted in SafeMode is: -For Gen 5 192.168.168.1, for Gen 6 192.168.1.1 -For Gen 5 192.168.168.168, for Gen 6 192.168.1.1 -For Gen 5 192.168.168.1, for Gen 6 192.168.1.254 -For Gen 5 192.168.1.254, for Gen 6 192.168.168.168 -For Gen 5 192.168.168.168, for Gen 6 192.168.1.254 - correct ansers ---For Gen 5 192.168.168.168, for Gen 6 192.168.1.254 To interpret traffic captured by the Packet Capture tool, it is necessary to understand the three-way handshake that occurs for every IKE connection or TCP connection. True False - correct ansers --True Clicking Create Backup overwrites the existing System Backup firmware image as necessary. True False - correct ansers --True

Show more Read less
Institution
SONICWALL SNSA - 2021
Course
SONICWALL SNSA - 2021










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SONICWALL SNSA - 2021
Course
SONICWALL SNSA - 2021

Document information

Uploaded on
November 18, 2022
Number of pages
17
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • sonicwall snsa 2021
  • sonicwall snsa

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lecden Miami Dade College - Interamerican Campus
View profile
Follow You need to be logged in order to follow users or courses
Sold
592
Member since
4 year
Number of followers
518
Documents
2684
Last sold
2 weeks ago
Best study guide exam's question and answers

1 We offer education materials, 2 Exams with correct answers and some explanation on it. 3 Best of study guide,do some Purchasing improve in your education or improve your students knowledge.

3.9

72 reviews

5
38
4
10
3
10
2
6
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions