Choose two A stealth B address transforms C protocol abnormality detection D

Choose two a stealth b address transforms c protocol

This preview shows page 3 - 5 out of 6 pages.

Which two types of firewall settings are found in Symantec Network Access Control? (Choose two.) A. stealth B. address transforms C. protocol abnormality detection D. smart traffic filters E. VPN tunneling Answer: A, D QUESTION: 214 Which three items can be used when creating Symantec Network Access Control firewall rules? (Choose three.) A. User ID B. Subnet Mask C. Network Adapter D. Network Service E. Application Answer: C, D, E QUESTION: 215 Which three steps must be taken in order to create a firewall policy that functions properly? (Choose three.) A. establish rules for the policy B. enable the policy 77
Image of page 3
C. enable system lockdown D. apply the policy to a group E. force the computer to restart Answer: A, B, D QUESTION: 216 Lifeline Supply Company acquired a small company with two hundred employees. Multiple firewall rules, based on collections of client addresses, are required to allow the new organization access to company resources. What should be created to minimize the amount of time needed to create rules? A. a new Centralized Exception B. a new Host Group C. a new Network Service D. a new Management Server List Answer: B QUESTION: 217 In a firewall rule, what is the only trigger type that uses a fingerprint?
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '19
  • IP address, Virtual private network, Logarithm, Symantec

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture