You find a suspicious connection from a problematic host. You decide that you want to block everything
from that whole network, not just the problematic host. You want to block this for an hour while you
investigate further, but you do not want to add any rules to the Rule Base. How do
you achieve this?
You are trying to save a custom log query in R76 SmartView Tracker, but getting the following
error:
Could not save (Error: Database is Read Only)
Which of the following is a likely explanation for this?
Your company enforces a strict change control policy. Which of the following would be MOST effective for
quickly dropping an attacker's specific active connection?
Which of the following are available SmartConsole clients which can be installed from the R76 Windows
CD? Read all answers and select the most complete and valid list.
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the
competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted
communication. Which of the following methods is BEST to accomplish this task?
You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block it in real
time and verify it is successfully blocked? Highlight the suspicious connection in SmartView Tracker: