Which of the below is the MOST correct process to reset SIC from SmartDashboard?
A. Click Communication > Reset on the Gateway object, and type a new activation key.
B. Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.
C. Run cpconfig, and click Reset.
D. Run cpconfig, and select Secure Internal Communication > Change One Time Password.
正解:B
質問 2:
Identify the ports to which the Client Authentication daemon listens by default.
A. 8080, 529
B. 259, 900
C. 256, 600
D. 80, 256
正解:B
質問 3:
Which of these Security Policy changes optimize Security Gateway performance?
A. Using groups within groups in the manual NAT Rule Base.
B. Use Automatic NAT rules instead of Manual NAT rules whenever possible.
C. Putting the least-used rule at the top of the Rule Base.
D. Using domain objects in rules when possible.
正解:B
質問 4:
One of your remote Security Gateway's suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the Security Management Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic Gateway object, you receive an error message. What is the problem?
A. The remote Gateway's IP address has changed, which invalidates the SIC Certificate.
B. There is no connection between the Security Management Server and the remote Gateway. Rules or routing may block the connection.
C. The time on the Security Management Server's clock has changed, which invalidates the remote Gateway's Certificate.
D. The Internal Certificate Authority for the Security Management Server object has been removed from objects_5_0.
正解:B
質問 5:
Which type of R76 Security Server does not provide User Authentication?
A. FTP Security Server
B. HTTPS Security Server
C. SMTP Security Server
D. HTTP Security Server
正解:C
質問 6:
Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
A. Symmetric IPsec keys are generated.
B. Peers authenticate using certificates or preshared secrets.
C. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
D. The DH public keys are exchanged.
正解:A
Horiuchi -
貴社テスト問題集を購入し、試験を受かりました。
本当に助かります。ありがとうございました。
友人にも貴社の商品を推奨しました。またどうぞよろしくお願いします。