Fill in the blank: A _______ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.
Correct Answer:
A
Which software blade does NOT accompany the Threat Prevention policy?
Correct Answer:
D
How many policy layers do Access Control policy support?
Correct Answer:
A
Two policy layers:
- Network Policy Layer
- Application Control Policy Layer
What is the benefit of “tw monitor” over “tcpdump”?
Correct Answer:
C
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.
Correct Answer:
B