1.
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?
2.
You are trying to save a custom log query in R76 SmartView Tracker, but getting the following error: Could not save (Error: Database is Read Only) Which of the following is a likely explanation for this?
3.
Which SmartConsole tool would you use to see the last policy pushed in the audit log?
4.
SmartView Tracker logs the following Security Administrator activities, EXCEPT:
5.
Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker's specific active connection?
6.
Which of the following are available SmartConsole clients which can be installed from the R76 Windows CD? Read all answers and select the most complete and valid list.
7.
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?
8.
You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block it in real time and verify it is successfully blocked? Highlight the suspicious connection in SmartView Tracker:
9.
Identity Awareness is implemented to manage access to protected resources based on a user's _____________.
10.
Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user's credentials?