SonicWall SNSA Exam Preparation
Complete Verified Questions and Answers
(Graded A+)
1.A customer has an established base of GVC VPN users with a WAN GroupVPN
policy configured. The customer wants to begin an implementation for SSL VPN
users. The existing group of GVC VPN users must be converted to SSL VPN users
because the SonicWALL security appliance does not support both types of VPN
users.
ANSWER: FALSE
2. SSL VPN eliminates the need for remote access authentication.
ANSWER: FALSE
3. Which of the following correctly describes how a bandwidth management rule
works?
-Can be configured for all VPN traffic
-Only applies to outbound traffic from the firewall to the WAN or any other
destination
-Can be configured only for individual VPN Security Associations
-Only applies to inbound traffic from the WAN to the firewall
ANSWER: Can be configured for all VPN traffic
4. What are the benefits provided by a VPN (select all that apply)?
-Securely connects distributed networks together
,2|Page
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication
ANSWER: -Securely connects distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication
5. What benefits are provided by a VPN (select all that apply)?
-Reporting
-Increased capacity
-Scalability
-Encryption
-Security
ANSWER: -Scalability
-Encryption
-Security
5. Which of the following is the most basic firewall technology?
-Packet filtering
-Single firewall
-Deep packet inspection
-Application proxies
,3|Page
ANSWER: -Packet filtering
6. The default firewall access rule allows all communication from the LAN to the
Internet.
-True
-False
ANSWER: -True
7. What is the purpose of a security policy?
-To authenticate the process by which users and devices are identified and granted
access to the network
-To monitor the network security and make sure the firewall is configured properly
to prevent inappropriate usage
-To make it more difficult for hackers to locate a security hole in a network's
gateway
-To describe how a company wants to approach security, including rules of
conduct and the determination of acceptable risk
ANSWER: -To describe how a company wants to approach security, including
rules of conduct and the determination of acceptable risk
8. What question would you ask to get specific information on user restrictions?
-What kinds of network traffic will you allow?
-Will the computers be locked away from the public, or will they have access to
the hardware?
-Will users be allowed to login at any time, from any location, to any machine?
, 4|Page
-Who should be allowed to access your services?
ANSWER: -Will users be allowed to login at any time, from any location, to any
machine?
9. Content Filtering Services applies to which of the following traffic protocols?
(Select all that apply.)
-HTTPS
-FTP
-HTTP
-Email attachments
ANSWER: -HTTP
-HTTPS
10. If the appliance loses connection to the SonicWALL site rating library: (Select
all that apply.)
-CFS blocks all web traffic (based on configuration)
-CFS continues to operate using the last ratings seen
-CFS allows all web traffic (based on configuration)
-CFS must use its internal logic to identify which traffic to block
ANSWER: -CFS blocks all web traffic (based on configuration)
-CFS allows all web traffic (based on configuration)
11. With SonicWALL CFS, network administrators have a flexible tool to provide
comprehensive filtering based on which of the following? (Select all that apply.)