1.
When configuring a Permanent Tunnel between two gateways in a Meshed VPN community, in what object is the tunnel managed?
2.
Which of the following log files contains only information about the negotiation process for encryption?
3.
Which of the following log files contains verbose information regarding the negotiation process and other encryption failures?
4.
Which components allow you to reset a VPN tunnel?
5.
Which command will erase all CRLs?
6.
Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?
7.
In GAiA, if one is unsure about a possible command, what command lists all possible commands.
8.
MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?
9.
A Threat Prevention profile is a set of configurations based on the following. Select the right answer.
10.
Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the |Performance pack running. What would Frank need to perform in order configure those settings?