100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Sophos Firewall Expert Q&A for Total Exam Domination

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
02-07-2025
Geschreven in
2024/2025

Which interface type is a virtual LAN created on an existing XG interface - VLAN you are working with sensitive corporate data and want to ensure that traffic from remote locations is monitored and blocked from leaving the corporate LAN. What would be the most appropriate security mode to deploy the RED devices in - Standard/Unified NAT rules require firewall rules to allow traffic - True When creating a NAT rule which option allows you to select - Override source translation When creating a NAT rule which option allows you to select different source NATs based on the outbound interface within a single rule? - Override source translation Which 2 methods can be used to generate one-time passwords for authenticating with the XG Firewall - Bridge, transparent Which of the following statements about zero-touch deployment are TRUE - Zero-touch configuration rules can only be created for unregistered hardware serial numbers What is the clientless Access portal used for? - To provide access to internal resources without the need for a VPN client to be installed Which firewall icon represents a disabled user Rule? - CWhich page list all current applications that are connecting through the XG Firewall? - Live connections

Meer zien Lees minder
Instelling
Sophos Firewall
Vak
Sophos Firewall









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Sophos Firewall
Vak
Sophos Firewall

Documentinformatie

Geüpload op
2 juli 2025
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Sophos Firewall Questions

Which interface type is a virtual LAN created on an existing XG interface
- ✔ ✔ VLAN

you are working with sensitive corporate data and want to ensure that
traffic from remote locations is monitored and blocked from leaving the
corporate LAN. What would be the most appropriate security mode to
deploy the RED devices in - ✔ ✔ Standard/Unified

NAT rules require firewall rules to allow traffic - ✔ ✔ True

When creating a NAT rule which option allows you to select - ✔ ✔
Override source translation

When creating a NAT rule which option allows you to select different
source NATs based on the outbound interface within a single rule? - ✔
✔ Override source translation

Which 2 methods can be used to generate one-time passwords for
authenticating with the XG Firewall - ✔ ✔ Bridge, transparent

Which of the following statements about zero-touch deployment are
TRUE - ✔ ✔ Zero-touch configuration rules can only be created for
unregistered hardware serial numbers

What is the clientless Access portal used for? - ✔ ✔ To provide
access to internal resources without the need for a VPN client to be
installed

Which firewall icon represents a disabled user Rule? - ✔ ✔ C

, Which page list all current applications that are connecting through the
XG Firewall? - ✔ ✔ Live connections

How many days of data is available in Sophos Central? - ✔ ✔ 7 days

What do you need to do in order to use NTLM and Kerberos for web
authentication? - ✔ ✔ Enable AD SSO per zone on the Device Access
page

The XG firewall's life implementation of Cloud Access security Broker
blocks all cloud applications by default - ✔ ✔ False

Below Below is an image of the XG Firewall Control Center. From here,
what would you click to access the Policy Test Simulator - ✔ ✔ Log
Viewer

Which 4 of the following are supported external authentication servers
on Sophos XG firewall 18.0? - ✔ ✔ eDirectory. Radius, Active
directory. LDAP

The option to create loopback and reflexive Nat rules is only when
adding NEW NAT rule, not when editing an existing NAT rule. - ✔ ✔
True

Which 3 options should be configured to ensure the most secure
scanning settings are in place to protect users as they browse the web?
- ✔ ✔ Malware scan mode: Batch, Engine Selection, Dual engine.
Content : Block

Which deployment mode can protect web servers from common
attacks? - ✔ ✔ Web Application Firewall

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
jackline98 Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
263
Lid sinds
2 jaar
Aantal volgers
152
Documenten
9862
Laatst verkocht
3 dagen geleden

Here you will find different past papers with correct and updated solutions .Please do not forget to leave a review after purchasing any document .Goodluck and success in advance.

3,3

60 beoordelingen

5
20
4
11
3
9
2
5
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen