MEGA MIX - SNSP SonicOS 7, SNSP
SonicOS 7
T or F - TOTP can retrieve the one-time password from the authenticator app when their
is no internet connection? - answerTrue
Select all the methods of accessing SonicOS CLI: - answerSSH connection via
SonicOS GUI
SSH connection through SSH client
Console Port
Which feature allows for the automatic upload of suspicious files on Windows devices
for advanced analysis? - answerCapture ATP
Maximum supported number of VPN Tunnel Interfaces? - answer64
SSH packets are inspected by which module? - answerDPI Module (page 604 in
textbook)
In a packet capture - ACK and RST flags would indicate what? - answerAccess Rule is
Disabled (page 119 in textbook)
T or F - Encryption used by SSH provides confidentiality and integrity of data over an
insecure network? - answerTrue (page 602 of textbook)
What are the features of SSH? (Select all that apply) - answer- provides secure data
communication
- allows for remote command line login
- cryptographic network protocol
What are the benefits of Application Control? (Select all that apply) - answer- application
based configuration
- configure policy settings for individual signatures without influencing other signatures
of the same application
- ease of use
T or F - OSPF Adjacency helps share networks with sites downstream and eliminates
the need to create individual routes - answerTrue
Select the answer with the six major steps of the Capture ATP process in the correct
order: - answer1. The SonicWall firewall sends the file to SonicWall Capture ATP cloud
services.
, 2. The SonicWALL Capture ATP cloud services saves the file in its repository.
3. SonicWALL Capture ATP cloud services reads and analyzes the file.
4. SonicWALL Capture ATP cloud services stores the results in the SonicWALL Capture
ATP cloud services database.
5. SonicWALL Capture ATP cloud services access the SonicWALL Capture ATP cloud
services database.
6. SonicWALL Capture ATP cloud services sends results to the SonicWALL firewall.
Which feature of SonicWall Capture Client helps create a complete profile of the
application, processes, and network activity? - answerContinuous behavioral monitoring
What are the two ways of installing the SonicWall Capture Client utility on a target
workstation? - answer- Downloading the client from mysonicwall.com
- Implementing Client Enforcement
What is the best method of authentication so that organizations can counteract ever
increasing password breaches? - answerTwo-Factor Authentication
T or F - The random password generated by SonicWall 2FA is multi-use and is not
deleted when the user is successfully granted access to the resource? - answerFalse
In SonicOS CLI, what command is used to quickly recover the firewall from the
uncertain configuration state? - answerSafemode command
What are the benefits of using SonicWall Command Line Interface? (Select all that
apply) - answer- It provides a faster and efficient way to configure and manage
SonicWall Firewall
- You can create a CLI script for automating configuration tasks
- It helps complete configuration tasks when the SonicOS web-based management UI is
not accessible
In SonicOS CLI, what command is used to export the settings file to troubleshoot the
issues related to the firewall? - answerExport command
Which of the following statements are applicable to the Allow Fragmented Packets
option when configuring a firewall access rule? - answer- The Allow Fragmented
Packets check box is enabled by default.
- If the option is selected, large IP packets are divided into fragments before they are
routed over the internet
-?
What are some of the major DNS attack types? (Select all that apply) - answer- DNS
Tunneling
- DNS Amplification
- DNS Spoofing
(page 948 of text book)
SonicOS 7
T or F - TOTP can retrieve the one-time password from the authenticator app when their
is no internet connection? - answerTrue
Select all the methods of accessing SonicOS CLI: - answerSSH connection via
SonicOS GUI
SSH connection through SSH client
Console Port
Which feature allows for the automatic upload of suspicious files on Windows devices
for advanced analysis? - answerCapture ATP
Maximum supported number of VPN Tunnel Interfaces? - answer64
SSH packets are inspected by which module? - answerDPI Module (page 604 in
textbook)
In a packet capture - ACK and RST flags would indicate what? - answerAccess Rule is
Disabled (page 119 in textbook)
T or F - Encryption used by SSH provides confidentiality and integrity of data over an
insecure network? - answerTrue (page 602 of textbook)
What are the features of SSH? (Select all that apply) - answer- provides secure data
communication
- allows for remote command line login
- cryptographic network protocol
What are the benefits of Application Control? (Select all that apply) - answer- application
based configuration
- configure policy settings for individual signatures without influencing other signatures
of the same application
- ease of use
T or F - OSPF Adjacency helps share networks with sites downstream and eliminates
the need to create individual routes - answerTrue
Select the answer with the six major steps of the Capture ATP process in the correct
order: - answer1. The SonicWall firewall sends the file to SonicWall Capture ATP cloud
services.
, 2. The SonicWALL Capture ATP cloud services saves the file in its repository.
3. SonicWALL Capture ATP cloud services reads and analyzes the file.
4. SonicWALL Capture ATP cloud services stores the results in the SonicWALL Capture
ATP cloud services database.
5. SonicWALL Capture ATP cloud services access the SonicWALL Capture ATP cloud
services database.
6. SonicWALL Capture ATP cloud services sends results to the SonicWALL firewall.
Which feature of SonicWall Capture Client helps create a complete profile of the
application, processes, and network activity? - answerContinuous behavioral monitoring
What are the two ways of installing the SonicWall Capture Client utility on a target
workstation? - answer- Downloading the client from mysonicwall.com
- Implementing Client Enforcement
What is the best method of authentication so that organizations can counteract ever
increasing password breaches? - answerTwo-Factor Authentication
T or F - The random password generated by SonicWall 2FA is multi-use and is not
deleted when the user is successfully granted access to the resource? - answerFalse
In SonicOS CLI, what command is used to quickly recover the firewall from the
uncertain configuration state? - answerSafemode command
What are the benefits of using SonicWall Command Line Interface? (Select all that
apply) - answer- It provides a faster and efficient way to configure and manage
SonicWall Firewall
- You can create a CLI script for automating configuration tasks
- It helps complete configuration tasks when the SonicOS web-based management UI is
not accessible
In SonicOS CLI, what command is used to export the settings file to troubleshoot the
issues related to the firewall? - answerExport command
Which of the following statements are applicable to the Allow Fragmented Packets
option when configuring a firewall access rule? - answer- The Allow Fragmented
Packets check box is enabled by default.
- If the option is selected, large IP packets are divided into fragments before they are
routed over the internet
-?
What are some of the major DNS attack types? (Select all that apply) - answer- DNS
Tunneling
- DNS Amplification
- DNS Spoofing
(page 948 of text book)