A. IPSec VPN does not support two factor authentication, SSL VPN does support this
B. IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.
C. SSL VPN adds an extra VPN header to the packet, IPSec VPN does not
D. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
A. fw ctl dbg -a 0
B. fw ctl debug set 0
C. fw ctl debug 0
D. fw ctl dbg resetall
A. fwm compile
B. fwm load
C. fwm install
D. fwm fetch
A. blada: application control AND action:drop
B. (blade: application control AND action;drop)
C. blade."application control AND action;drop
D. blade;"application control AND action:drop
A. Network location, the telephone number of a user and the UID of a machine.
B. Network location, the identity of a user and the identity of a machine.
C. Geographical location, the identity of a user and the identity of a machine.
D. Network location, the identity of a user and the active directory membership.
A. Cpmqueue set
B. St cpmq enable
C. cpmq set
D. Cpmq config
A. ip show Int eth0
B. ifconfig -i eth0 verbose
C. show interface eth0 mq
D. ethtool A eth0
A. R81.20 Security Management Server
B. A single Security Gateway
C. A full Security Cluster (All Cluster Members included)
D. Multiple Security Gateways and/or Clusters
A. There are 8 priority queues by default, and up to 8 additional queues can be manually configured
B. There are 8 priority queues and this number cannot be changed.
C. There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.
D. There are 7 priority queues by default and this number cannot be changed.
A. Matching a log against each event definition
B. Matching a log against local exclusions
C. Create an event candidate
D. Matching a log against global exclusions
A. F2F (Slow path), Accelerated Path, Medium Path and F2V
B. F2F (Slow path), Accelerated Path, PQX and F2V
C. F2F (Slow path). Templated Path. PQX and F2V
D. F2F (Slow path). PXL, QXL and F2V
A. Java Script
B. Text
C. XML
D. JSON
A. SecureXL can be disabled in cpconfig
B. fwaccel commands can be used in clish
C. Dynamic objects are available in the Object Explorer
D. Only one packet in a stream is seen in a fw monitor packet capture
A. 443,389
B. 290; 3389
C. 389; 636
D. 636; 8080
A. Certificate
B. One-time password
C. Token
D. Shared secret