Loading questions...
Updated
URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?
Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?
How many packets are needed to establish IKEv1?
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
You are using the Identity Collector with Identity Awareness in large environment. Users report that they cannot access resources on Internet. You identify that the traffic is matching the cleanup rule instead of the proper rule with Access Roles using the IDC. How can you check if IDC is working?
When URL category is not found in the kernel cache, what action will GW do?
What is correct about the Resource Advisor (RAD) service on the Security Gateways?
Which of these packet processing components stores Rule Base matching state-related information?
Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS, and compiles them together into unified Pattern Matchers?
You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore, you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?
Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE), what types of keys are generated by IKE during negotiation?
Troubleshooting issues with Mobile Access requires the following:
Support Examcademy
Your support keeps this platform running. Become a Supporter to remove all ads and unlock exclusive study tools.
You need to monitor traffic pre-inbound and before the VPN-module in a security gateway. How would you achieve this using fw monitor?
What is the best way to resolve an issue caused by a frozen process?
Create a free account to unlock all questions for this exam.
Log In / Sign UpWhat is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
What is NOT a benefit of the ‘fw ctl zdebug’ command?