Computer Networking > QUESTIONS & ANSWERS > SONICWALL SNSA Questions and Answers With Complete Solution (All)
SONICWALL SNSA Questions and Answers With Complete Solution A customer has an established base of GVC VPN users with a WAN GroupVPN policy configured. The customer wants to begin an implementation ... for SSL VPN users. The existing group of GVC VPN users must be converted to SSL VPN users because the SonicWALL security appliance does not support both types of VPN users. ✔Ans✔ FALSE SSL VPN eliminates the need for remote access authentication. ✔Ans✔ FALSE Which of the following correctly describes how a bandwidth management rule works? -Can be configured for all VPN traffic -Only applies to outbound traffic from the firewall to the WAN or any other destination -Can be configured only for individual VPN Security Associations -Only applies to inbound traffic from the WAN to the firewall ✔Ans✔ Can be configured for all VPN traffic What are the benefits provided by a VPN (select all that apply)? -Securely connects distributed networks together -Prevents denial-of-service attacks on remote connections -Enables a remote connection to the LAN via the Internet -Assures remote clients have up-to-date anti-virus software -Provides data confidentiality and sender authentication ✔Ans✔ -Securely connects distributed networks together -Enables a remote connection to the LAN via the Internet -Provides data confidentiality and sender authentication What benefits are provided by a VPN (select all that apply)? -Reporting -Increased capacity -Scalability -Encryption -Security ✔Ans✔ -Scalability -Encryption -Security Which of the following is the most basic firewall technology? -Packet filtering -Single firewall -Deep packet inspection -Application proxies ✔Ans✔ -Packet filtering The default firewall access rule allows all communication from the LAN to the Internet. -True -False ✔Ans✔ -True What are two advantages of a multiple firewall? -Protects restricted special resources -Offers protection from external attacks while each network segment has free access to other segments -Helps protect entire departments ✔Ans✔ What are two advantages of a multiple firewall? -Protects restricted special resources What is the purpose of a security policy? -To authenticate the process by which users and devices are identified and granted access to the network -To monitor the network security and make sure the firewall is configured properly to prevent inappropriate usage -To make it more difficult for hackers to locate a security hole in a network's gateway -To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk ✔Ans✔ -To describe how a company wants to approach security, including rules of conduct and the determination of acceptable risk What question would you ask to get specific information on user restrictions? -What kinds of network traffic will you allow? -Will the computers be locked away from the public, or will they have access to the hardware? -Will users be allowed to login at any time, from any location, to any machine? -Who should be allowed to access your services? ✔Ans✔ -Will users be allowed to login at any time, from any location, to any machine? [Show More]
Last updated: 1 year ago
Preview 1 out of 28 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Mar 05, 2023
Number of pages
28
Written in
This document has been written for:
Uploaded
Mar 05, 2023
Downloads
0
Views
67
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·