Information Technology > EXAM > SonicWALL - SNSA(Updated)Questions And Answers (All)
What are two probe methods that you can use for logical probes? (select all that apply) Ping and TCP Action objects allow you to control how the category behaves when a website from that categ... ory is accessed. Which action object is used to throttle the traffic? Bandwidth Management (BWM) Which of the following Address Object types is selected by default in the firewall? Host Which diagnostic utility on the SonicWall firewall allows you to look at the contents of ip packets traversing the firewall? Packet Monitor Where is the real-time data on the Dashboard compiled and summarized from? Manage >> AppFlow Settings What type of information is displayed on the Live Monitor panel?(Select all that apply) Multi-Core Monitor Applications Ingress/Egress Bandwidth Ingress/Egress Packet Rate Ingress/Egress Packet Size Connection Rate Connection Count Which file types can be used to export the logs? (Select all that apply) CSV, TEXT and Email What is the default timeout setting for administrator inactivity? 5 Minutes What type of encoding format is supported when importing an end-user certificate with a private key? PKCS#12 Which SonicOS GUI option is used to create a snapshot of the current system state? Create Backup Which interface is used by SonicOS as the backup hearbeat link? X0 The firewall snapshot section displays the percentage of encryted traffic flowing through the firewall. True Which setting is used to turn on the CFS Security Service? Manage >> Security Config >> Content Filter >> Select "Sonicwall CFS" for content Filter Type Which Security Configuration menu option is used to enable client DPI-SSL? Manage > Security Config > Decryption Services > General Tab, check box "Enable SSL Client Inspection" and all below it: Intrusion Prevention, Gateway Anti-Virus, Gateway Anti- Spyware, Application Firewall, Content Filter. Which Match Object property will control what type of policy it can be used in? Match object type What are the key components of a CFS policy?(Select all that apply) Block Passphrase (Authenticate) confirm Bandwidth Management Which Logs panel depicts the Eicar test virus file download? Investigate > Logs > Event Logs A Site-to-Site VPN can allow simultaneous access to multiples remote servers True Which statement about SonicWall Gateway Anti-Virus service is correct? -It inspects all traffic that traverse the Sonicwall Gateway. -It inspects multiple application protocols, as well as generic TCP streams and compressed traffic. -Because Sonicwall GAV does not have to perform reassembly, there are no file-size limitations imposed by the scanning engine. -Decompression are also performed on a single pass, per packet basic. Which of the following sentences is correct about HA configuration? High Availability does not support Portshield interfaces and Native Bridge mode. What type of NAT policies does a Public Server wizard create? Inbound, Outbound, and Loopback NAT Policies Which of the following are included in the output of a network probe? (Select all that apply) Name, Probe Target, Probe Type, Gateway, Local IP, Interface, Interval, Port, Response Timeout, Failure Threshold, Success Threshold, All Must Respond, RST is failure Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing tha firewall? Packet Monitor What are two route policy modes that are enable by Dynamic Routing? Advanced Routing and Simple RIP Advertisement Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway? LAN Settings Panel/ Page Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces? Ratio Load Balancing Type Which of the following are required for WAN ISP Failover and Load balancing?(Select all that apply) A second ISP connection and Placing each WAN on separate subnets What does a WAN Failover solution enable?(Select all that apply) Maintaining a persistent connection for the WAN port traffic by failing over to the secondary WAN port and Directing redundant routes to one or more secondary service providers In the Event Logs, which of the following will generate a log message for any dropped packets? Manage > Logs & reporting> logs Settings > Base Setup > Expand Network Category > ICMP Packets Dropped, select the box under the GUI column to show in the Event Logs What type of certificate store be used to install the certificate? Trusted Root Certification Authorities [Show More]
Last updated: 1 year ago
Preview 1 out of 12 pages
Instant download
Instant download
Connected school, study & course
About the document
Uploaded On
Nov 20, 2022
Number of pages
12
Written in
This document has been written for:
Uploaded
Nov 20, 2022
Downloads
0
Views
33
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·