Professional Documents
Culture Documents
Second Evalaution
Second Evalaution
5
1. Which feature of the XG Firewall helps prevent a computer infected by a trojan from transmitting
personal information out of their network?
3. You are preparing a hardware XG Firewall for installation on a remote site. The order for the license
has not yet been processed. Which device registration option do you select in the Initial Setup wizard?
2. Which security feature helps protect against attacks from the Internet?
2. When a RED is deployed in Standard/Unified mode, how do the computers on the remote network
get their IP address?
3. The company is preparing to deploy several RED devices at locations that deal with sensitive
corporate data. Management would like to ensure that traffic from those locations can be monitored and
blocked from leaving the corporate LAN. What would be the most appropriate security mode to deploy the
RED devices in?
8. Authentication v17.5
1. You have many contractors that will be assisting with a project. What type of user can be created to
allow these users temporary access to resources with the least amount of effort?
2. Which 2 of the following statements are TRUE about how the XG Firewall uses authentication
servers?
3. Which 4 of the following are supported external authentication servers on Sophos XG Firewall 17.5?
2. Below is an image of the XG Firewall Control Center. From here, what would you click to access the
Policy Test simulator?
3. Which 3 of the following are displayed by the Cloud Applications dashboard widget?
The answer can be found in Module 6: Web Protection and Application Control on slide 78.
Which image shows the best way to configure the surfing quota?
2. Which 3 of the following protocols can the XG Firewall scan when implementing email protection?
3. What 2 of the following are methods that can be used to allow access to a wireless hotspot on the
XG Firewall?
2. Where can an end user download the SSL VPN client from to install on their workstation?
2. There are several important reports that need to be examined on a regular schedule from the XG
Firewall. You want to make these easily available when working with the WebAdmin interface. How can this
be accomplished?
3. You get a call from another administrator who was looking at the XG Firewall reports and noticed the
application risk meter was at 4.2. They were not sure if this was a cause for concern, so they decided to
bring it to your attention. Which of the following should be the basis of your response?
3. The XG Firewall can be deployed as a virtual appliance. Which 5 virtualization platforms is the XG
Firewall 17.5 supported on?
16. Labs v17.5
1. You are configuring a new XG Firewall and have already forgotten your admin password. You have
not created any other administrator users yet. How can the admin password be reset to the default?
2. You have created an SSL VPN Remote Access policy for your Active Directory users, but you are
unable to authenticate successfully to establish a VPN connection. What do you need to do to resolve the
issue?
3. TRUE or FALSE: IPS policies can be applied to both User/Network rules and Business Application
rules.
4. The diagram below shows a company with two sites, one in London and in New York. Each site has
an Internet connection and is also connected via an MPLS.
You are configuring a static route on the London gateway to route traffic destined for the New York network
over the MPLS.
What IP address would need to go into the Gateway field to complete the static rule shown above?
6. TRUE or FALSE: Hotspots can only be created for wireless networks using the separate zone
access method.
7. In Email Protection, where do you enable the SPX Reply Portal?
8. After enabling ATP on the XG Firewall, you test the ATP policy and cannot get the block page to
appear. You examine the configuration to see what is misconfigured.
Select the item that is preventing the block page from appearing.