Question 1

What are three valid actions in a File Blocking Profile? (Choose three)
  • Question 2

    Refer to Exhibit:


    A firewall has three PDF rules and a default route with a next hop of 172.29.19.1 that is configured in the default VR. A user named XX-bes a PC with a 192.168.101.10 IP address.
    He makes an HTTPS connection to 172.16.10.29.
    What is the next hop IP address for the HTTPS traffic from Wills PC.
  • Question 3

    When using certificate authentication for firewall administration, which method is used for authorization?
  • Question 4

    Which feature must you configure to prevent users form accidentally submitting their corporate credentials to a phishing website?
  • Question 5

    Refer to the exhibit.

    Which certificates can be used as a Forwarded Trust certificate?