TRUE or FALSE: IPS policies can be applied to both User/Network rules...
Wireless access points are being deployed across a large office space....
A customer has called you because they have forgotten their admin...
Your customer has an XG Firewall that is deployed in gateway mode, and...
In Lab 3 you configured a local NAT policy.
...
In Lab 2 you created a bridge with two ports that were both in the LAN...
In Lab 7 you simulated a computer with a missing heartbeat, and...
You have a RED device deployed at a remote network in a standard/split...
When configuring a RED manually with a USB stick, what do you need to...
In Lab 4 you configured Web Server Protection.
...
In Lab 3 you configured an advanced DoS policy.
...
What does the command "service -S" do?
Select one:
What is the importance of using a valid email address when you enable...
Your customer wants to create a gateway on a VLAN interface in their...
In Lab 9 you retrieved a log file from an XG Firewall.
...
You want to create a rule so that only traffic from secure servers in...
How do you read the contents of a Consolidated Troubleshooting Report...
When you are sizing for a virtual XG Firewall, what performance...
A client contacts you complaining that their virtual XG firewall has...
A customer calls you because some settings have been changed on their...
Look at the diagram below.
...
Which of the following dynamic routing protocols are supported by...
You are the network administrator of the Sophos Store, a large...
What ports are used by the RED 15 and RED 50? (select all that apply)
...
Your company is configuring a site to site VPN with another company in...
In Lab 8 you created an Active-Active cluster, and then an...
In Lab 4 you configured a Webserver Protection Business Application...
What is used to determine which channels the access point can...
You are enabling SSH access to an XG Firewall using keys.
...
You have a large network that spans many different subnets. Wireless...
Your customer has called you because they have a computer with a...
You are troubleshooting STAS issues for a customer and want to check...
Your customer's environment consists of a number of Windows...
Your customer has configured Security Heartbeat on their XG Firewall...
In Lab 5, if the New York Gateway had 2 WAN connections, then how many...
Your XG Firewall is configured with multiple IP addresses on the WAN...
How many Business Application Rules do you need to create when...
After configuring two new VPN connections, everything is running fine...
In which RED deployment mode do you need to configure the following?
...
On which devices can you disable HA? (select all that apply)
...
In Lab 5 you configured site-to-site VPN connections for multiple...
Your customer has deployed STAS on their network for single sign-on....
In Lab 2 you configure policy routing for an MPLS scenario. When you...
You configured Web Server Authentication for a customer when you...
A customer wants to confirm whether their planned configuration for a...
In Lab 6 you cleared the cached authentication status after installing...
Your customer is configuring Web Server for their webmail but is...
Following an extended period of growth your customer is starting to...
You are working with a large customer with offices in countries all...
How is a RED configured to connect to Sophos XG Firewall? (select all...
You are helping a customer configure an IPsec site-to-site VPN using...
Which of the following statements are TRUE about the port that is used...
A customer is having problems configuring Web Server Protection for a...
You are sizing a hardware XG Firewall for a prospect that has the...
Which of the following are prerequisites for creating a HA cluster?...
A company is looking at replacing their existing firewall with a...
Which of the following statements are TRUE about an Active-Passive...
What are the primary considerations when sizing a RED? (select all...
Your customer contacts you for assistance in configuring DoS...
Your customer is configuring Web Server for their webmail but is...
An existing customer wants to roll out VPN access to a large number of...
A customer is configuring a Web Server Protection Policy but is not...
In Lab 5 you configured an XG-to-XG RED tunnel.
...
Which of the following statements are TRUE about an Active-Active...
A customer has added an MPLS between its large offices in the UK, US...
You are creating a new and optimized IPS rule.
...
Which of the following statements are TRUE about the virtual MAC...
A customer wants to protect external access to their Exchange server...
You are deploying STAS for a large customer. They have multiple sites...