Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.
Which component of SandBlast protection is her company using on a Gateway?
The admin lost access to the Gaia Web Management Interface but he was able to connect via ssh. How can you check if the web service is enabled, running and which port is used?
identity Awareness allows easy configuration for network access, and auditing based on what three items?
To optimize Rule Base efficiency, the most hit rules should be where?
How can you grant GAiAAPI Permissions for a newly created user?
Which is the lowest gateway version supported by R81.20 management server?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
When performing a minimal effort upgrade, what will happen to the network traffic?
What is the correct order of the default “fw monitor” inspection points?
Which component is NOT required to communicate with the Web Services API?
How to can you make sure that the old logs will be available after updating the Management to version R81.20 using the Advanced Upgrade Method?
Which of the following is NOT an attribute of packet acceleration?
After having saved the Clish Configuration with the "save configuration config.txt" command, where can you find the config.txt file?
What is the best sync method in the ClusterXL deployment?