100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SonicWALL Basic Administration Questions & Answers Graded A+ Latest update

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
20-11-2024
Written in
2024/2025

Which of the following is NOT a valid System boot option: -Uploaded Firmware -New Firmware -Current Firmware -Current Firmware with Factory Defaults - Answer--New Firmware What are the benefits provided by a VPN (select all that apply)? -Securely connects distributed networks together -Prevents denial-of-service attacks on remote connections -Enables a remote connection to the LAN via the Internet -Assures remote clients have up-to-date anti-virus software -Provides data confidentiality and sender authentication - Answer--Securely connects distributed networks together -Enables a remote connection to the LAN via the Internet -Provides data confidentiality and sender authentication What benefits are provided by a VPN (select all that apply)? -Reporting -Increased capacity -Scalability -Encryption -Security - Answer--Scalability -Encryption -Security Which of the following is the most basic firewall technology? -Packet filtering -Single firewall -Deep packet inspection -Application proxies - Answer--Packet filtering The default firewall access rule allows all communication from the LAN to the Internet. -True -False - Answer--TrueWhat are two advantages of a multiple firewall? -Protects restricted special resources -Offers protection from external attacks while each network segment has free access to other segments -Helps protect entire departments - Answer-What are two advantages of a multiple firewall? -Protects restricted special resources What is the purpose of a security policy? -To authenticate the process by which users and devices are identified and granted access to the network -To monitor the network security and make sure the firewall is configured properly to prevent inappropriate usage -To make it more difficult for hackers to locate a security hole in a network's gateway -To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk - Answer--To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk What question would you ask to get specific information on user restrictions? -What kinds of network traffic will you allow? -Will the computers be locked away from the public, or will they have access to the hardware? -Will users be allowed to login at any time, from any location, to any machine? -Who should be allowed to access your services? - Answer--Will users be allowed to login at any time, from any location, to any machine? Content Filtering Services applies to which of the following traffic protocols? (Select all that apply.) -HTTPS -FTP -HTTP -Email attachments - Answer--HTTP -HTTPSIf the appliance loses connection to the SonicWALL site rating library: (Select all that apply.) -CFS blocks all web traffic (based on configuration) -CFS continues to operate using the last ratings seen -CFS allows all web traffic (based on configuration) -CFS must use its internal logic to identify which traffic to block - Answer--CFS blocks all web traffic (based on configuration) -CFS allows all web traffic (based on configuration) With SonicWALL CFS, network administrators have a flexible tool to provide comprehensive filtering based on which of the following? (Select all that apply.) -Allowed domain designations -Time of day -SMTP -Keywords -LDAP Groups -Forbidden domain designations -FTP - Answer--Allowed domain designations -Time of day -Keywords -Forbidden domain designations The default CFS policy when assigned "Via Users and Zones Screens" should be the most restrictive. -True -False - Answer-True The SonicWALL Log can be exported in the following formats: (Choose all that apply) -Log View -Comma-separated value (CSV) -Tab Delimited -Plain text - Answer--Comma-separated value (CSV) -Plain text

Show more Read less
Institution
SonicWALL Basic Administration
Course
SonicWALL Basic Administration









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SonicWALL Basic Administration
Course
SonicWALL Basic Administration

Document information

Uploaded on
November 20, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SonicWALL Basic Administration
Questions & Answers Graded A+ Latest
update
Which of the following is NOT a valid System boot option:

-Uploaded Firmware
-New Firmware
-Current Firmware
-Current Firmware with Factory Defaults - Answer--New Firmware

What are the benefits provided by a VPN (select all that apply)?

-Securely connects distributed networks together
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication - Answer--Securely connects
distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication

What benefits are provided by a VPN (select all that apply)?

-Reporting
-Increased capacity
-Scalability
-Encryption
-Security - Answer--Scalability
-Encryption
-Security

Which of the following is the most basic firewall technology?

-Packet filtering
-Single firewall
-Deep packet inspection
-Application proxies - Answer--Packet filtering

The default firewall access rule allows all communication from the LAN to the Internet.

-True
-False - Answer--True

, What are two advantages of a multiple firewall?

-Protects restricted special resources
-Offers protection from external attacks while each network segment has free access to
other segments
-Helps protect entire departments - Answer-What are two advantages of a multiple
firewall?

-Protects restricted special resources

What is the purpose of a security policy?

-To authenticate the process by which users and devices are identified and granted
access to the network

-To monitor the network security and make sure the firewall is configured properly to
prevent inappropriate usage

-To make it more difficult for hackers to locate a security hole in a network's gateway

-To describe how a company wants to approach security, including rules of conduct and
the determination of acceptable risk - Answer--To describe how a company wants to
approach security, including rules of conduct and the determination of acceptable risk

What question would you ask to get specific information on user restrictions?

-What kinds of network traffic will you allow?

-Will the computers be locked away from the public, or will they have access to the
hardware?

-Will users be allowed to login at any time, from any location, to any machine?

-Who should be allowed to access your services? - Answer--Will users be allowed to
login at any time, from any location, to any machine?

Content Filtering Services applies to which of the following traffic protocols? (Select all
that apply.)

-HTTPS
-FTP
-HTTP
-Email attachments - Answer--HTTP
-HTTPS

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICMATERIALS City University New York
View profile
Follow You need to be logged in order to follow users or courses
Sold
555
Member since
2 year
Number of followers
186
Documents
10590
Last sold
5 hours ago

4.1

93 reviews

5
52
4
11
3
21
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions