Join the discussion
Question 1/70
How is a proxy policy different from a packet filter policy? (Select two.)
Correct Answer: C,D
C: Proxies can prevent potential threats from reaching your network without blocking the entire connection.
D: A proxy operates at the application layer, as well as the network and transport layers of a TCP/IP packet, while a packet filter operates onlyat the network and transport protocol layers.
Incorrect:
Not A: A packet filter examines each packet's IP header to control the network traffic into and out of your network.
Reference: Fireware Basics, Courseware: WatchGuard System Manager 10, page 95
D: A proxy operates at the application layer, as well as the network and transport layers of a TCP/IP packet, while a packet filter operates onlyat the network and transport protocol layers.
Incorrect:
Not A: A packet filter examines each packet's IP header to control the network traffic into and out of your network.
Reference: Fireware Basics, Courseware: WatchGuard System Manager 10, page 95
Add Comments
- Other Question (70q)
- Q1. How is a proxy policy different from a packet filter policy? (Select two.)...
- Q2. Users on the trusted network cannot browse Internet websites. Based on the configuration s...
- Q3. You need to create an HTTP-proxy policy to a specific domain for software updates (example...
- Q4. Which diagnostic tasks can you run from the Traffic Monitor tab of Firebox System Manager?...
- Q5. You can configure the SMTP-proxy policy to restrict email messages and email content based...
- Q6. Which tool can add an IP address for the Firebox to permanently block? (Select one)...
- Q7. If you use an external authentication server for mobile VPN, which option must you complet...
- Q8. With the policies configured as shown in this image, HTTP traffic can be sent and received...
- Q9. Users on the trusted network cannot browse Internet websites. Based on the configuration s...
- Q10. A local branch office VPN tunnel route is configured as shown in this image. On the remote...
- Q11. If you disable the Outgoing policy, which policies must you add to allow trusted users to ...
- Q12. In the network configuration in this image, which aliases is Eth2 a member of? (Select thr...
- Q13. Which of these options must you configure in an HTTPS-proxy policy to detect credit card n...
- Q14. If you use an external authentication server for mobile VPN, which option must you complet...
- Q15. From the SMTP proxy action settings in this image, which of these options is configured fo...
- Q16. Match each type of NAT with the correct description: Conserves IP addresses and hides the ...
- Q17. You can configure your Firebox to send log messages to how many WatchGuard Log Servers at ...
- Q18. In a Mobile VPN configuration, why would you choose default route VPN over split tunnel VP...
- Q19. Which of these services would you use to allow the use of P2P programs for a specific depa...
- Q20. You have a privately addressed email server behind your Firebox. If you want to make sure ...
- Q21. How can you include log messages from more than one Firebox in a single report generated b...
- Q22. Which of these threats can the Firebox prevent with the default packet handling settings? ...
- Q23. You can configure your Firebox to send log messages to how many WatchGuard Log Servers at ...
- Q24. While troubleshooting a branch office VPN tunnel, you see this log message: 2014-07-23 12:...
- Q25. Which takes precedence: WebBlocker category match or a WebBlocker exception?...
- Q26. You can configure your Firebox to send log messages to how many WatchGuard Log Servers at ...
- Q27. HOTSPOT Match each WatchGuard Subscription Service with its function: (Exhibit)...
- Q28. Which items are included in a Firebox backup image? (Select four.)...
- Q29. Which of these actions adds a host to the temporary or permanent blocked sites list? (Sele...
- Q30. Match each WatchGuard Subscription Service with its function. Controls access to website b...
- Q31. When your device is in a default state, to which interface do you connect your management ...
- Q32. Match each WatchGuard Subscription Service with its function. Uses rules, pattern matching...
- Q33. When you examine the log messages In Traffic Monitor, you see that some network packets ar...
- Q34. Which authentication servers can you use with your Firebox? (Select four.)...
- Q35. What is the best method to downgrade the version of Fireware OS on your Firebox without lo...
- Q36. In this diagram, which branch office VPN tunnel route must you add on the Site A Firebox t...
- Q37. While troubleshooting a branch office VPN tunnel, you see this log message: 2014-07-23 12:...
- Q38. Match the monitoring tool to the correct task. Which tool can view a list of users connect...
- Q39. Match each WatchGuard Subscription Service with its function. Cloud based service that con...
- Q40. Which takes precedence: WebBlocker category match or a WebBlocker exception?...
- Q41. HOTSPOT Match the monitoring tool to the correct task: (Exhibit)...
- Q42. With the policies configured as shown in this image, HTTP traffic can be sent and received...
- Q43. A user receives a deny message that the installation file (install.exe) is blocked by the ...
- Q44. You need to create an HTTP-proxy policy to a specific domain for software updates (example...
- Q45. Which of these options are private IPv4 addresses you can assign to a trusted interface, a...
- Q46. Which of these threats can the Firebox prevent with the default packet handling settings? ...
- Q47. You can use Firebox System Manager to download a PCAP file that includes packet informatio...
- Q48. An email newsletter about sales from an external company is sometimes blocked by spamBlock...
- Q49. Which policies can use the Intrusion Prevention Service to block network attacks? (Select ...
- Q50. Your company denies downloads of executable files from all websites. What can you do to al...
- Q51. Match each WatchGuard Subscription Service with its function. Controls access to website b...
- Q52. A local branch office VPN tunnel route is configured as shown in this image. On the remote...
- Q53. After you enable spamBlocker, your users experience no reduction in the amount of spam the...
- Q54. What is one reason that users could see a certificate warning in their web browsers when t...
- Q55. Match each WatchGuard Subscription Service with its function. Uses signatures to provide r...
- Q56. Which authentication servers can you use with your Firebox? (Select four.)...
- Q57. Which WatchGuard tools can you use to review the log messages generated by your Firebox? (...
- Q58. Which of these actions adds a host to the temporary or permanent blocked sites list? (Sele...
- Q59. Match each type of NAT with the correct description: Allows a user on the trusted or optio...
- Q60. From the Firebox System Manager >Authentication List tab, you can view all of the authe...
- Q61. A user receives a deny message that the installation file (install.exe) is blocked by the ...
- Q62. While troubleshooting a branch office VPN tunnel, you see this log message: 2 014-07-23 12...
- Q63. You can configure your Firebox to send log messages to how many WatchGuard Log Servers at ...
- Q64. Which diagnostic tasks can you run from the Traffic Monitor tab of Firebox System Manager?...
- Q65. You can use Firebox-DB authentication with any type of Mobile VPN....
- Q66. Which of these services would you use to allow the use of P2P programs for a specific depa...
- Q67. What settings must you device configuration file include for Gateway AntiVirus to protect ...
- Q68. Match each type of NAT with the correct description: Conserves IP addresses and hides the ...
- Q69. Match each WatchGuard Subscription Service with its function. Prevents accidental or unaut...
- Q70. When your device is in a default state, to which interface do you connect your management ...

[×]
Download PDF File
Enter your email address to download WatchGuard.Essentials.v2024-08-08.q70.pdf