Which two actions are available for antivirus security profiles? (Choose
two.)
A. continue
B. allow
C. block IP
D. alert Correct Ans - B. allow
D. alert
Which two HTTP Header Logging options are within a URL filtering profile?
(Choose two.)
A. User‐Agent
B. Safe Search
C. URL redirection
D. X‐Forward‐For Correct Ans - A. User ‐Agent
D. X‐Forward‐For
What are the two components of Denial ‐of ‐Service Protection? (Choose
two.)
A. zone protection profile
B. DoS protection profile and policy rules
C. flood protection
D. reconnaissance protection Correct Ans - A. zone protection
profile
B. DoS protection profile and policy rules
Which two types of attacks does the PAN ‐DB prevent? (Choose two.)
A. phishing sites
B. HTTP based command ‐and ‐control
C. infected JavaScript
D. flood attacks Correct Ans - A. phishing sites
B. HTTP based command ‐and ‐control
Which two valid URLs can be used in a custom URL category? (Choose two.)
A. ww.youtube.**
B. www.**.com
C. www.youtube.com
D. *.youtube.com Correct Ans - C. www.youtube.com
,D. *.youtube.com
What are three methods of mapping usernames to IP addresses? (Choose
three.)
A. Server Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port mapping Correct Ans - A. Server Monitoring
D. syslog
F. port mapping
Which type of server profile is used to create group mappings?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP Correct Ans - D. LDAP
The Server Monitoring user mapping method can monitor which three
types of
servers? (Choose three.)
A. RADIUS
B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers Correct Ans - B. Microsoft Domain
Controllers
C. Exchange Servers
D. Novell eDirectory Servers
The Port Mapping user mapping method can monitor which two types of
environments? (Choose two.)
A. Citrix
B. Microsoft terminal servers
C. Exchange Servers
D. Linux servers Correct Ans - A. Citrix
B. Microsoft terminal servers
, The Windows User ‐ID Agent can be installed on which two operating
systems?
(Choose two.)
A. Linux
B. Server 2016
C. XP
D. Server 2008 Correct Ans - B. Server 2016
D. Server 2008
A Heatmap provides an adoption rate for which three features? (Choose
three.)
A. WildFire
B. Traps
C. File Blocking
D. User‐ID
E. SSL certificates
F. authentication profiles Correct Ans - A. WildFire
C. File Blocking
D. User‐ID
What are three Best Practice Assessment tool primary categories? (Choose
three.)
A. User‐ID
B. Logging
C. Vulnerability Protection
D. Security
E. Decryption
F. DoS Protection Correct Ans - D. Security
E. Decryption
F. DoS Protection
Which two security features normally do not achieve an adoption rate of
100%?
(Choose two.)
A. URL Filtering
B. App‐ID
C. Logging
D. DNS Sinkhole Correct Ans - D. DNS Sinkhole
A. URL Filtering
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studyhall. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $23.49. You're not tied to anything after your purchase.