Which of the following is a CLI command for Security Gateway R71?
Which antivirus scanning method does not work if the Gateway is connected as a node in proxy mode?
Which of the following can be found in cpinfo from an enforcement point?
When you hide a rule in a Rule Base, how can you then disable the rule?
The SIC certificate is stored in the________ directory.
Which of the following is a hash algorithm?
URL filtering policy can make exceptions for specific sites by being enforced:
You are creating an output file with the following command:Fw monitor -e "accept (arc=10 . 20 . 30 . 40 or dst=10 , 20 , 30 – 40) ; " -o ~/outputWhich tools do you use to analyze this file?
Because of pre-existing design constraints, you set up manual NAT rules for HTTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through a Security Gateway Way without a problem, but traffic from the Web server is dropped on rule 0 because of […]
When using the Anti-Virus Content Security, how are different file types analyzed?