XG Firewall Overview v17.5
XG Firewall Overview v17.5
XG Firewall Overview v17.5
5
1. Which feature of the XG Firewall helps prevent a computer infected by a trojan from transmitting
personal information out of their network?
The answer can be found in Module 1: XG Firewall Overview on slide 21.
One computer has a red health status. On which 2 of the networks can the endpoints be protected from the
computer with a red health status?
The answer can be found in Module 3: Network Protection on slide 47.
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
1. Which firewall icon shown would represent a network rule that will drop or reject traffic?
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
rule to listen on 2222 to match the port on the server in the DMZ. Enter the number (in digits) of DNAT rules
that you need to create.
The answer can be found in Module 3: Network Protection on slide 25.
2. You are in the process of deploying multiple RED devices. Due to bandwidth issues at the head
office, which 2 modes of deployment could be used to so that only necessary traffic is routed back to the
head office?
3. When creating a site-to-site VPN between an XG Firewall and another vendor’s firewall, what is the
best protocol to use?
8. Authentication v17.5
1. TRUE or FALSE: The Sophos Chromebook User ID app is deployed to Chromebooks from the XG
Firewall.
2. When using STAS, where in the network can the agent software installed and configured?
3. You have been asked to install STAS on your servers. Which 3 of the following are required for the
installation to be successful?
2. You would like to restrict users from logging into Google services that are not tied to company
approved domains. Where in a web policy can you find the option to enforce that only certain domains are
available for Google Apps?
3. When testing a new web policy, you are still able to access pages that should be blocked. What is
the most likely reason for this?
The answer can be found in Module 6: Web Protection and Application Control on slide 6.
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
Which image shows the best way to configure the surfing quota?
2. In Email Protection, which 2 methods can be used to define which internal mail servers incoming
emails are routed to?
2. Which of the following best describes the Bridge to AP LAN security mode for wireless networks?
3. In Wireless Protection, which 2 of the following are ways that MAC filtering can be configured?
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
2. You are configuring Clientless VPN Portal access for users of a specific application. The application
supports HTTPS, SSH, DCOM, and RPC connections. Which 2 of these would be available to use in the
clientless VPN portal?
2. There are several important reports that need to be examined on a regular schedule from the XG
Firewall. You want to make these easily available when working with the WebAdmin interface. How can this
be accomplished?
3. When you click links to firewall rules and policies in the log viewer, where does it open?
2. Which 2 of the following deployment methods require you to purchase a separate Sophos XG
Firewall base license?
The answer can be found in Module 11: Sizing and Evaluation on slide 8.
3. The XG Firewall can be deployed as a virtual appliance. Which 5 virtualization platforms is the XG
Firewall 17.5 supported on?
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
Which 4 of the following statements about this NAT rule are TRUE?
3. After enabling ATP on the XG Firewall, you test the ATP policy and cannot get the block page to
appear. You examine the configuration to see what is misconfigured.
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
Select the item that is preventing the block page from appearing.
4. You have created an SSL VPN Remote Access policy for your Active Directory users, but you are
unable to authenticate successfully to establish a VPN connection. What do you need to do to resolve the
issue?
5. TRUE or FALSE: IPS policies can be applied to both User/Network rules and Business Application
rules.
The answer can be found in lab task 3.7.
6. TRUE or FALSE: Hotspots can only be created for wireless networks using the separate zone
access method.
This study source was downloaded by 100000840805068 from CourseHero.com on 01-27-2022 08:57:17 GMT -06:00
https://www.coursehero.com/file/59693235/Cevaplardocx/
Powered by TCPDF (www.tcpdf.org)