|GUARANTEED ACCURATE
ANSWERS
A customer has an established base of GVC VPN users with a WAN
GroupVPN policy configured. The customer wants to begin an
implementation for SSL VPN users. The existing group of GVC VPN
users must be converted to SSL VPN users because the SonicWALL
security appliance does not support both types of VPN users. -
ACCURATE ANSWERS✔✔ FALSE
SSL VPN eliminates the need for remote access authentication. -
ACCURATE ANSWERS✔✔ FALSE
Which of the following correctly describes how a bandwidth
management rule works?
-Can be configured for all VPN traffic
-Only applies to outbound traffic from the firewall to the WAN or any
other destination
-Can be configured only for individual VPN Security Associations
-Only applies to inbound traffic from the WAN to the firewall -
ACCURATE ANSWERS✔✔ Can be configured for all VPN traffic
,What are the benefits provided by a VPN (select all that apply)?
-Securely connects distributed networks together
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication - ACCURATE
ANSWERS✔✔ -Securely connects distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication
What benefits are provided by a VPN (select all that apply)?
-Reporting
-Increased capacity
-Scalability
-Encryption
-Security - ACCURATE ANSWERS✔✔ -Scalability
-Encryption
-Security
Which of the following is the most basic firewall technology?
,-Packet filtering
-Single firewall
-Deep packet inspection
-Application proxies - ACCURATE ANSWERS✔✔ -Packet filtering
The default firewall access rule allows all communication from the LAN
to the Internet.
-True
-False - ACCURATE ANSWERS✔✔ -True
What are two advantages of a multiple firewall?
-Protects restricted special resources
-Offers protection from external attacks while each network segment has
free access to other segments
-Helps protect entire departments - ACCURATE ANSWERS✔✔ What
are two advantages of a multiple firewall?
-Protects restricted special resources
What is the purpose of a security policy?
, -To authenticate the process by which users and devices are identified
and granted access to the network
-To monitor the network security and make sure the firewall is
configured properly to prevent inappropriate usage
-To make it more difficult for hackers to locate a security hole in a
network's gateway
-To describe how a company wants to approach security, including rules
of conduct and the determination of acceptable risk - ACCURATE
ANSWERS✔✔ -To describe how a company wants to approach
security, including rules of conduct and the determination of acceptable
risk
What question would you ask to get specific information on user
restrictions?
-What kinds of network traffic will you allow?
-Will the computers be locked away from the public, or will they have
access to the hardware?