1.
Which statement is TRUE about implicit rules?
2.
All of the following are Security Gateway control connections defined by default implied rules, EXCEPT:
3.
A Security Policy has several database versions. What configuration remains the same no matter which version is used?
4.
Installing a policy usually has no impact on currently existing connections. Which statement is TRUE?
5.
Several Security Policies can be used for different installation targets. The firewall protecting Human Resources' servers should have a unique Policy Package. These rules may only be installed on this machine and not accidentally on the Internet firewall. How can this be configured?
6.
In a distributed management environment, the administrator has removed the default check from Accept Control Connections under the Policy > Global Properties > FireWall tab. In order for the Security Management Server to install a policy to the Firewall, an explicit rule must be created to allow the server to communicate to the Security Gateway on port __________.
7.
To check the Rule Base, some rules can be hidden so they do not distract the administrator from the unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do you accomplish this?
8.
What is the purpose of a Stealth Rule?
9.
Which of these Security Policy changes optimize Security Gateway performance?
10.
Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows: RequireD. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5. The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?