SOPHOS FIREWALL V19.5 QUESTIONS WITH COMPLETE
SOLUTIONS GUARANTEED PASS BRAND NEW 2025
Lateral movement protection is made possible by which of the
following? -ANSWER ->Synchronized Security
Which 2 of these are features of the X stream architecture? -ANSWER -
>TLS 1.3 Decryption und Deep packet inspection
Which feature of the Sophos Firewall helps prevent a computer
infected by a trojan from transmitting personal information out of their
network? -ANSWER ->Advanced Threat Protection
Which feature of the Sophos firewall identifies unknown applications? -
ANSWER ->Synchronized App Control
What cloud platforms is Sophos Firewall supported on? -ANSWER -
>AWS, Azure und Nutanix
How many radios do the wireless XGS series models have? -ANSWER -
>1
True or False: The number of ports can be expanded using additional
modules. -ANSWER ->True
You have received a new hardware Sophos Firewall. What is the default
IP address and port that is used to access the device? -ANSWER -
>172.16.16.16:4444
You are preparing a Sophos Firewall for installation on a remote site.
The order for the license hat not yet been processed. Which device
,registration option do you select in the Initial Setup wizard? -ANSWER -
>I do not want to register now.
Service objects can be created for which of the following? -ANSWER -
>TCP/UDP Ports, IP Protocol Number, ICMP Type and Code
In which of these zones is an interface configured with a gateway? -
ANSWER ->WAN
How many gateways can you include in an SD-WAN profile? -ANSWER -
>8
Place the route types in the correct default order of precedence -
ANSWER ->1. Static; 2. SD-WAN; 3. VPN; 4. Default
How many servers does Sophos Firewall support for static DNS? -
ANSWER ->3
You have an existing DHCP server. What configuration allows Sophos
firewall to forward lease requests to this? -ANSWER ->Relay
Which of these are defined as Admin services in Device access? -
ANSWER ->HTTPS and SSH
You want a certificate to be signed by a third-party company. which
option should you choose? -ANSWER ->Generate CSR
What are the different types of traffic shaping policy you can create? -
ANSWER ->Users, Web categories, Rules, Applications
What do you need to configure before you can start using traffic
shaping? -ANSWER ->Total WAN bandwidth
, True of False: NAT rules are processed in order from top to bottom -
ANSWER ->True
True or False: All firewall rules are evaluated and the best match is
used. -ANSWER ->false
Which 3 of the following are matching criteria Sophos Firewall uses to
automatically assign firewall rules to groups? -ANSWER ->Destination
ZONE, Source ZONE, Rule type
complete the sentence below:
When creating a firewall rule for DNAT, you select the ________
destination zone. -ANSWER ->Post NAT
Where would you exclude a website from TLS inspection? -ANSWER -
>WEB -> URL Groups
Where would you configure which chipper algorithms to block? -
ANSWER ->Decryption profile
What 2 things do you need to do to use IPS policies -ANSWER ->Select
an IPS policy in a firewall rule; Enable IPS using the switch
Spoof Protection -ANSWER ->Drops traffic that is trying to pretend to
come from a different MAC of IP address to bypass protection
DoS Protection -ANSWER ->Drops traffic that is maliciously trying to
prevent legitimate traffic from being able to access services.
IPS Policies -ANSWER ->Protects against exploits and malformed traffic.
SOLUTIONS GUARANTEED PASS BRAND NEW 2025
Lateral movement protection is made possible by which of the
following? -ANSWER ->Synchronized Security
Which 2 of these are features of the X stream architecture? -ANSWER -
>TLS 1.3 Decryption und Deep packet inspection
Which feature of the Sophos Firewall helps prevent a computer
infected by a trojan from transmitting personal information out of their
network? -ANSWER ->Advanced Threat Protection
Which feature of the Sophos firewall identifies unknown applications? -
ANSWER ->Synchronized App Control
What cloud platforms is Sophos Firewall supported on? -ANSWER -
>AWS, Azure und Nutanix
How many radios do the wireless XGS series models have? -ANSWER -
>1
True or False: The number of ports can be expanded using additional
modules. -ANSWER ->True
You have received a new hardware Sophos Firewall. What is the default
IP address and port that is used to access the device? -ANSWER -
>172.16.16.16:4444
You are preparing a Sophos Firewall for installation on a remote site.
The order for the license hat not yet been processed. Which device
,registration option do you select in the Initial Setup wizard? -ANSWER -
>I do not want to register now.
Service objects can be created for which of the following? -ANSWER -
>TCP/UDP Ports, IP Protocol Number, ICMP Type and Code
In which of these zones is an interface configured with a gateway? -
ANSWER ->WAN
How many gateways can you include in an SD-WAN profile? -ANSWER -
>8
Place the route types in the correct default order of precedence -
ANSWER ->1. Static; 2. SD-WAN; 3. VPN; 4. Default
How many servers does Sophos Firewall support for static DNS? -
ANSWER ->3
You have an existing DHCP server. What configuration allows Sophos
firewall to forward lease requests to this? -ANSWER ->Relay
Which of these are defined as Admin services in Device access? -
ANSWER ->HTTPS and SSH
You want a certificate to be signed by a third-party company. which
option should you choose? -ANSWER ->Generate CSR
What are the different types of traffic shaping policy you can create? -
ANSWER ->Users, Web categories, Rules, Applications
What do you need to configure before you can start using traffic
shaping? -ANSWER ->Total WAN bandwidth
, True of False: NAT rules are processed in order from top to bottom -
ANSWER ->True
True or False: All firewall rules are evaluated and the best match is
used. -ANSWER ->false
Which 3 of the following are matching criteria Sophos Firewall uses to
automatically assign firewall rules to groups? -ANSWER ->Destination
ZONE, Source ZONE, Rule type
complete the sentence below:
When creating a firewall rule for DNAT, you select the ________
destination zone. -ANSWER ->Post NAT
Where would you exclude a website from TLS inspection? -ANSWER -
>WEB -> URL Groups
Where would you configure which chipper algorithms to block? -
ANSWER ->Decryption profile
What 2 things do you need to do to use IPS policies -ANSWER ->Select
an IPS policy in a firewall rule; Enable IPS using the switch
Spoof Protection -ANSWER ->Drops traffic that is trying to pretend to
come from a different MAC of IP address to bypass protection
DoS Protection -ANSWER ->Drops traffic that is maliciously trying to
prevent legitimate traffic from being able to access services.
IPS Policies -ANSWER ->Protects against exploits and malformed traffic.