1.
How is wear on the flash storage device mitigated on diskless appliance platforms?
2.
Your R76 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?
3.
Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?
4.
What is the officially accepted diagnostic tool for IP Appliance Support?
5.
Anti-Spoofing is typically set up on which object type?
6.
Spoofing is a method of:
7.
When you use the Global Properties' default settings on R76, which type of traffic will be dropped if NO explicit rule allows the traffic?
8.
Which item below in a Security Policy would be enforced first?
9.
Your shipping company uses a custom application to update the shipping distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway's Rule Base includes a rule to accept this traffic. Since you are responsible for multiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted on this rule. Which of the following would work BEST for your purpose?
10.
A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for?