1.
Robert has configured a Common Internet File System (CIFS) resource to allow access to the public partition of his company's file server, on \\erisco\goldenapple\files\public. Robert receives reports that users are unable to access the shared partition, unless they use the file server's IP address. Which of the following is a possible cause?
2.
You want to create an IKE VPN between two VPN-1 NGX Security Gateways, to protect two networks. The network behind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind the peer's Gateway. Which type of address translation should you use, to ensure the two networks access each other through the VPN tunnel?
3.
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
4.
Which type of service should a Security Administrator use in a Rule Base to control access to specific shared partitions on target machines?
5.
How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_Ato end point Net_B, through an NGX Security Gateway?
6.
You have an internal FTP server, and you allow downloading, but not uploading. Assume Network Address Translation is set up correctly, and you want to add an inbound rule with: Source : Any Destination: FTP server Service : FTP resources object. How do you configure the FTP resource object and the action column in the rule to achieve this goal?
7.
Damon enables an SMTP resource for content protection. He notices that mail seems to slow down on occasion, sometimes being delivered late. Which of the following might improve throughput performance?
8.
Yoav is a Security Administrator preparing to implement a VPN solution for his multi-site organization. To comply with industry regulations, Yoav's VPN solution must meet the following requirements: Portability : Standard Key management: Automatic, external PKI Session keys : Changed at configured times during a connection's lifetime Key length : No less than 128-bit Data integrity : Secure against inversion and brutE. force attacks What is the most appropriate setting Yoav should choose?
9.
You must set up SIP with a proxy for your network. IP phones are in the 172.16.100.0 network. The Registrar and proxy are installed on host 172.16.100.100. To allow handover enforcement for outbound calls from SIP-net to network Net_B on the Internet, you have defined the following objects: Network object : SIP-net: 172.16.100.0/24 SIP-gateway : 172.16.100.100 VoIP Domain object : VolP_domain_A 1. EnD. point domain : SIP-net 2.VoIP gateway installed at: SIP-gateway host object How would you configure the rule?
10.
The following rule contains an FTP resource object in the Service field: Source : local_net Destination: Any Service : FTP-resource object Action : Accept How do you define the FTP Resource Properties > Match tab to prevent internal users from receiving corporate files from external FTP servers, while allowing users to send files?