This Architecture Assessment Trivia Quiz focuses on practical scenarios involving Sophos XG Firewall configurations. It assesses skills in network security, firewall rule management, and system troubleshooting, catering to professionals seeking to enhance their technical expertise in firewall administration.
1
2
3
4
5
6
7
Rate this question:
Yes
No
Rate this question:
EIGRP
RIP
OSPF
IS-IS
IGRP
BGP
PIM-SM
Rate this question:
There was no firewall rule to allow traffic from the LAN zone to another port in the LAN zone
Routing had not been enabled for the bridge pair
ICMP had not been enabled for the LAN zone
Rate this question:
Add another NIC to the server and configure Gateway mode with Multi port L3 bridge
Connect another XG Firewall Port to the switch and configure Active-Backup LAG
Connect another XG Firewall Port to the switch and configure 802.3ad LAG
Add another NIC to the server and make L3 bridge with multiple ports
Rate this question:
Configure the packets per second in the DoS policy to 25,600
Configure the DoS policy for SYN-Flood protection
Configure the DoS policy for UDP-Flood protection
Configure the DoS policy per destination
Configure the packets per second in the DoS policy to 256
Configure the packets per second in the DoS policy to 2,560
Configure the DoS policy per source
Rate this question:
Set advanced-firewall sys-traffic-nat add destination 0.0.0.0 netmask 0.0.0.0 snatip 10.1.1.45
Set advanced-firewall sys-traffic-nat add destination * snatip 10.1.1.45
Set advanced-firewall sys-traffic-nat add snatip 10.1.1.45
Rate this question:
True
False
Rate this question:
System dos-config show dos-rules
Show dos-config rules
Dos-config show dos-policies
System show dos-rules
Rate this question:
Disable IPS for the LAN zone to the SERVERS zone
Configure the Local NAT Policy on the firewall
Change the FastPath threshold value
Configure a more appropriate IPS policy for the LAN zone to the SERVERS zone
Adjust the size of the connection tracking database
Turn off Strict Policy on the firewall
Rate this question:
You need to add all list of the URLs that you want to be hardened
You can include wildcards in the URLs
You need to add all of the URLs that you want people to access directly
The URLs are case sensitive
You need to add all of the URLs on your website
You need to add all of the directories on your website
Rate this question:
Enable Path-specific routing and select 'Hot-standby mode'
Web Server Protection cannot do this, you need to use a load-balancing Business Application Rule
Enable 'Sticky Sessions'
Create two separate Business Application Rules, the top one will be the primary
Create an antivirus exception for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Create a form hardening exception for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Add ID 981003 to the filter rule skip list
Enable accept unhardened form data for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Add ID 981200 to the filter rule skip list
Add ID 9 to the filter rule skip list
Rate this question:
Create an antivirus exception for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Enable accept unhardened form data for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Add ID 9 to the filter rule skip list
Add ID 981003 to the filter rule skip list
Create a form hardening exception for the URL /MEWebMail/Mondo/lang/sys/login.aspx
Add ID 981200 to the filter rule skip list
Rate this question:
In the Authentication Template
In the Web Server Protection Policy
In the Path-specific routing
In the firewall authentication methods
In the Web Server Authentication Policy
In the Business Application Rule
In the Authentication Server
Rate this question:
Enabled 'Pass Outlook Anywhere' in the Protection Policy
Enable 'Rewrite HTML' in the Business Application Rule
Create an exception for that path that will skip static URL hardening
Create an exception for that path that will skip cookie signing
Enable 'Pass Host Header' in the Business Application Rule
Create an exception for that path that will 'Accept unhardened form data'
Rate this question:
Authentication Type
Action on VPN Restart
Remote IP Address
Connection Type
Policy
NAT Overlap
NAT Traversal
Route Precedence
VPN Failover
Rate this question:
1
2
3
4
6
8
10
Rate this question:
Configure the Local NAT Policy
Configure route precedence on the XG firewall
Change the order of the firewall rules so the MPLS traffic rule is above the VPN rule.
Adjust the weights on the static routes
Configure Policy based routing to route the traffic
Rate this question:
Turn off Tunnel Compression on all of the RED tunnels between the Host and the remote locations
Add a second virtual XG firewall to the virtual host and move half of the RED connections to it
Disable IPS on any policies not using HTTP
Standard/Split
Transparent/Split
Standard/Unified
Rate this question:
The configuration is created on Sophos XG Firewall
The RED can load the configuration from a USB drive
The RED can download the configuration from the provisioning servers
The RED sends a discovery packet to the IP address 1.2.3.4
The RED can be configured using its own web interface
Rate this question:
The WAN interface must have a static IP address
If you lose the unlock code the RED cannot ever be connected to another Sophos XG Firewall
The USB key must never be unplugged from the RED
Rate this question:
There is no firewall rule to allow the traffic
No route has been configured for the traffic
The route precedence needs to be configured to favor the RED tunnel
The XG Firewall needs to be rebooted
The RED tunnel needs to be added to the VPN zone
Rate this question:
The agent may not be configured with the collector IP address
The collector may not be configured with the IP address of the branch office XG Firewall and vice versa
The XG Firewall in the branch office may not be configured to allow the Collector in the VPN zone
Rate this question:
Tcpdump "host 172.16.16.78 and port 6060"
Tcpdump "host 172.16.16.50 and port 5566"
Tcpdump "host 172.16.16.78 and port 6677"
Tcpdump "host 172.16.16.43 and port 6677"
Tcpdump "host 172.16.16.43 and port 5566"
Tcpdump "host 172.16.16.16 and port 6677"
Tcpdump "host 172.16.16.16 and port 6060"
Rate this question:
With the command "ipset -D lusers "
Flush the cache for the Authentication Server
Restart the Authentication service in the WebAdmin
Reinstall the STAS software
Rate this question:
Configure the heartbeat IP address as a permitted network resource in the VPN profile
Configure the DNS server for the computer to be the XG Firewall
Enable VPN support for the firewall in Sophos Central
Add the WAN port to the permitted network resources for the VPN
Add 'cloud.sophos.com' to the VPN permitted network resourced
Rate this question:
Malware has not been cleaned up
Malicious traffic to a known C&C server has been detected
Active malware has been detected
The Endpoint Agent is not running
Inactive malware has been detected
A PUA (Potentially Unwanted Application) has been detected
Communications to a known bad host has been detected
Rate this question:
User
Client ID
MAC Address
IP Address
Hostname
Live lookup to Sophos Central
Rate this question:
Add the IP address of the XG firewall to the split networks
Add the IP address of the access point to the split networks
Add 1.2.3.4 to the remote network list
Configure a split DNS server address
Rate this question:
WEP
WPA
WPA2
Rate this question:
414 UDP
2712 TCP
415 UDP
3148 UDP
443 TCP
Rate this question:
Determine if any of the walls or ceilings are made of materials that will significantly impede the signal
Floor plan of the offices
Perform a site survey at the various locations
Scan the to see which channels are being used by other wireless networks
The number of computers connecting to the physical network
Estimate the number of devices that will be connecting at each location
The number of servers in each office
Rate this question:
The number of ports on the XG Firewall
How heavily utilized the current device is
The cost of the VPN client
Specific security requirements
How much bandwidth is available where the XG is located
Whether users will be connecting using wireless
Rate this question:
Primary
Auxiliary
Standalone
Rate this question:
The primary device owns the virtual MAC address
There is a virtual IP assigned to the virtual MAC address
The virtual MAC address is the physical address of the primary device
There is one virtual MAC address for each interface except the dedicated HA port
The virtual MAC address is applied to the interface on both devices
Rate this question:
Must have the TELNET admin service enabled
Must have the SSH admin service enabled
Can be configured via DHCP
Must be in a zone of type DMZ
Must be in a zone of type HA
Must be the same port on both devices
The IP address must be in the same subnet on both devices
Rate this question:
The MTU-MSS on the dedicated port should be default
Hardware devices must be the same model
The MAC address must be overridden on the dedicated HA port
The Sophos XG Firewall firmware version must be the same
Devices must have the same number of ports
Rate this question:
Use the "system ha active-active off" command
Disable HA and create a new cluster
Change the cluster mode on the primary device
Rate this question:
Number of users
Dual WAN ports
Throughput (Mbit/s)
VLAN tagging
LCD display
Built-in wireless
Rate this question:
12%
10%
5%
15%
7%
Rate this question:
The average number of concurrent users
The issuer of the HTTPS certificate
The peak number of concurrent users
Who their ISP is
The number of mailboxes on the Exchange Server
The size of the mailboxes
Whether they will be using dual AV scanning
Rate this question:
XG450
XG550
XG330
XG210
XG430
XG310
XG230
Rate this question:
Boot into SF Loader and reset the admin password to default
The device will need to be RMA'd to Sophos
Reset the password from the Sophos website
Reset the password from the MyUTM portal
Sophos can remotely reset the admin password
Use the 'Forgot password' link on the WebAdmin login page
Upload the CTR to the MyUTM site and use the web-based viewer
Use the viewer in the WebAdmin
Use the standalone tool from the Sophos Website
It is encrypted and can only be read by Sophos
Use SCP to copy the file from the XG Firewall
Send the logs via email
Download them from the WebAdmin
Upload them to an FTP server from the XG Firewall
Rate this question:
Quiz Review Timeline (Updated): Aug 5, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.