1.
Which parameters may be defined in an Access Role?
2.
A user complains that he cannot access the Internet. You check the logs and find that he is not authenticated. Next, you check the firewall to see if the user is a known identity. What command would you use?
3.
Which of the following actions applies to a Risk Level of 3 Medium?
4.
Which of the following actions applies to a Risk Level of 2 Low?
5.
Which of the following actions applies to a Risk Level of 1 Very Low?
6.
Using Event Viewer in SmartEvent, a Security Administrator discovers that the Application Blade has detected three applications: YouTube, Tor, and PC in IE. Of these three applications, which would be considered the most dangerous?
7.
During the Application Control Discovery process, what is the best source of information for decisions on blocking or not blocking an application?
8.
What are the possible options to configure the Identity Sources (user identification methods with Identity Awareness)?
9.
As a Security Administrator, if you wanted to make rules that apply to an access role as well as an application, what would need to be enabled on the Security Gateway?
10.
For troubleshooting purposes, Shira needs to check the currently identified users on the gateway. Which CLI command shows all users/machines and all the activity records associated with them?