Dr Billis troubleshooting a VPN problem. He wants to use SmartView Tracker to determine if the
key exchange is successful, and if any errors are being generated. The Global Properties Log and
Alert page settings for Dr King’s system uses default settings for VPN-1/FireWall-1. Will Dr Billbe
able to get the information he needs from SmartView Tracker?
The Certificate Authority: (Choose two)
Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gateway object that
A SecureClient configuration is being verified with Secure Configuration Verification (SCV) on an
Enforcement Module. Which of the following is NOT true?
In the event that an unauthorized user attempts to compromise a valid SecureClient connection,
the SecureClient machine can remain protected by:
Which of the following statements is FALSE concerning Policy Servers?
Dr Billis creating rules and objects to control Voice over IP (VoIP) traffic, through his organization’s
VPN-1/FireWall-1 Enforcement Module. Dr Billcreates VoIP-domain SIP objects, to represent each
of his organization’s three SIP gateways. Dr Billthen creates a simple group to contain the VoIP
domain SIP objects. When Dr Billattempts to add the VoIP-domain SIP objects to the group, they
are not listed. What is the problem?
Dr Billis a Security Administrator preparing to configure his VPN-1/FireWall-1 Rule Base, to
accommodate Voice over IP (VoIP) traffic. Dr Billhas the information displayed below.
VoIP Domain Session Initiation Protocol (SIP): NorbertEnd Point Domain: 10.10.100.0GateKeeper
Server IP : 10.10.100.Phone Type: Pingtel instant expressa(tm) softphone Version 1.2.1RTP Port
Settings: UDP Port 5079RTCP Port Settings: UDP Port 5075
Does Dr Billhave enough information to configure his objects and rules?
Dr Billwants to protect internal users from malicious Java code. However, he does not want to strip
Java scripts. Which is the BEST configuration option?
You are a VPN-1/FireWall-1 Security Administrator. You must discover the users who are
attempting to circumvent SecureClient protection mechanisms. In which of the following logs
would you MOST likely find the information you need?