Question: 1
You have been tasked to configure access to a new web server located in the DMZ
Based on the diagram what configuration changes are required in the NGFW virtual router to route traffic from the 10 1 1 0/24 network to 192 168 1 0/24?
Question: 2
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Question: 3
Which Security profile can you apply to protect against malware such as worms and Trojans?
Question: 4
Which option shows the attributes that are selectable when setting up application filters?
A Category, Subcategory, Technology, and Characteristic
B Category, Subcategory, Technology, Risk, and Characteristic
C Name, Category, Technology, Risk, and Characteristic
D Category, Subcategory, Risk, Standard Ports, and Technology
Answer : B
Show Answer
Hide Answer
Question: 5
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?