1.
Which authentication type permits five different sign-on methods in the authentication properties window?
2.
Which of the following objects is a valid source in an authentication rule?
3.
Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Why?
4.
Which authentication type requires specifying a contact agent in the Rule Base?
5.
Which set of objects have an Authentication tab?
6.
As a Security Administrator, you are required to create users for authentication. When you create a user for user authentication, the data is stored in the ___________.
7.
Review the following rules. Assume domain UDP is enabled in the implied rules. What happens when a user from the internal network tries to browse to the Internet using HTTP? The user:
8.
Which Security Gateway R75 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated?
9.
All R75 Security Servers can perform authentication with the exception of one. Which of the Security Servers cannot perform authentication?
10.
Security Gateway R75 supports User Authentication for which of the following services? Select the response below that contains the MOST complete list of supported services.