Study the Rule base and Client Authentication Action properties screen.
After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?
You have enabled “Full Log†as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
What will be the effect of running the following command on the Security Management Server?