Answers
Which page lists all current applications that are connecting through the Sophos Firewall
Correct Ans-Live connection
Which of the follwing is an attack useing a spoof email to persuade users to provide sensitive
information or credentials Correct Ans-Phishing
Which interface type is a group of interfaces that act as a single connection Correct Ans-LAG
which is the most common deployment scenario for Sophos Firewall? Correct Ans-Gateway
mode
Which 3 of the following forms of access can be secured using one time passwords? Correct
Ans-User Portal
Clientless VPN Portal
SSL and IPsec VPN
When a RED is deployed in Standard/Unified mode. how do the computers on the remote
network geht their Ipadress? Correct Ans-From a DHCP server Running on the Sophos
Firewall
,Which 2 of the following statments about Firewall authentication servers are True? Correct
Ans-Authentication servers are processed in oder until one is matched
Multiple authenication servers can be vonrifurated for redeundancy
Which 2 methods are suported for log of detection when useing STAS Correct Ans-PING
Workstation Poling
You are working with sensitive corporate date and want to ensure that traffic from remote
locations is monitored and blocked from leaving the corporate LAN. What would be the most
appropiate sucurity mode to deplay the RED devices in Correct Ans-Standard/Unified
Which of the following DoS and spoof protection modes wioll drop packets if the source IP
address dead not match an entry on the firewalls routing table? Correct Ans-IP-Spoofing
True or False: When Central Firewall Management is in use, local rules on the Sophos Firewall
are only overwritten when a rule with the same name is created in Sophos Central. Correct
Ans-True
Which 2 operating systems is the Sophos Connect IPsec VPN client available for? Correct
Ans-Windows
MacOS
, Which page lists all current applications that are connecting through the Sophos Firewall?
Correct Ans-Application connections
When configuring SD-WAN profiles for load balancing, what two methods can be used?
Correct Ans-Session persistence
Round Robin
TRUE or FALSE. The Sophos Chromebook User ID app is deployed to Chromebooks from the
Sophos Firewall. Correct Ans-True
What type of user can be created to allow temporary access to resources with the least amount
of effort? Correct Ans-Guest User
Which method allows a web quota to be based on category and time? Correct Ans-Web
policy rule quota
You have enabled active-active high availability on your Sophos Firewall and notice that
synchronized application control is not working across your network. Why would this happen?
Correct Ans-Synchronized Application Control is not supported in this deployment scenario
Which 2 features are required if you want to make use of lateral movement protection?
Correct Ans-Intercept X