S80 - XG Firewall v18.0 - Technician: No Firewall Rule Was Matched
S80 - XG Firewall v18.0 - Technician: No Firewall Rule Was Matched
S80 - XG Firewall v18.0 - Technician: No Firewall Rule Was Matched
0 - Technician
Incorrect ID
This study source was downloaded by 100000844025221 from CourseHero.com on 03-22-2022 16:47:12 GMT -05:00
https://www.coursehero.com/file/121786561/firewall-180-tecpdf/
13. What issue is shown in this log extract from csc.log?
Mismatching policy
16. What is the default SSL VPN port? 8443
This study source was downloaded by 100000844025221 from CourseHero.com on 03-22-2022 16:47:12 GMT -05:00
https://www.coursehero.com/file/121786561/firewall-180-tecpdf/
23. In which ipset can you see whether an IP address has been associated with a user?
Enter the name of the ipset. The ipset is Iusers
24. Which of the following are only available when using the web proxy? SafeSearch
Enforcement, Explicit Proxy, Parent Proxy
25. Enter the command to enable debug logging for DPI web scanning, Acceptable
responses: service -ds nosync ips:debugp, service ips:debugp -ds nosync
26. What is the expected maximum duration for resolving a web request by the web
proxy in microseconds? The expected maximum duration for resolving a web request by the web
proxy is 50,000
27. If a URL has no category, what might it show up as in the log? Uncategorized, None
29. Which port is used to establish the Security Heartbeat between an endpoint and XG
Firewall?
30. What threat would be reported when malicious outbound traffic is detected by the
endpoint?
31. Where do you confirm the users and groups for web server authentication?
Authentication Policy,
32. You need to skip a threat filter rule, where would you enter the ID? Protection Policy
33. You have identified a form hardening issue from the reverseproxy.log, where would
you got to resolve this? Firewall Rule
34. A user has clicked on a link from a search engine to a page but access is blocked.
Which feature is most likely to be responsible? Static URL Hardening
35. What mode should the protection policy be set to when refining the configuration so
as to not block access? Monitor
36. Enter the magic IP address that the access point sends traffic to. Acceptable responses:
1.2.3.4
37. Enter the management port used by the access point. Acceptable responses: 2712
This study source was downloaded by 100000844025221 from CourseHero.com on 03-22-2022 16:47:12 GMT -05:00
https://www.coursehero.com/file/121786561/firewall-180-tecpdf/
38. Which command can be used to check what devices are on the route from the access
point to the magic IP address? tracert 1.2.3.4
39. Enter the tool that can be used to connect to an access point. Acceptable responses: awetool
40. Complete the following command for checking for errors connecting to the Cyren
antispam database. grep “err ..........................................” /log/syslog.log - Acceptable
responses: ctasd
41. Which of the following can you enable and disable quarantine digests for? Group,
User
42. What is the primary log file for email protection in MTA mode? Acceptable responses:
smtpd_main.log
43. What is the URL for the support portal where you can search the knowledgebase and
raise a ticket? https://Acceptable responses: support.sophos.com
44. What partition is the reporting data stored on? Acceptable responses: var, /var
45. What CONSOLE command can you use to check the disk utilization? system
diagnostics show disk
46.
This study source was downloaded by 100000844025221 from CourseHero.com on 03-22-2022 16:47:12 GMT -05:00
https://www.coursehero.com/file/121786561/firewall-180-tecpdf/
Powered by TCPDF (www.tcpdf.org)