최신 CCSA 156-215.76 무료샘플문제:
1. Which of the following is a viable consideration when determining Rule Base order?
A) Adding SAM rules at the top of the Rule Base
B) Grouping rules by date of creation
C) Grouping IPS rules with dynamic drop rules
D) Placing frequently accessed rules before less frequently accessed rules
2. An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R76 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).
Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.
If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.
Which of the following is the BEST explanation for this behavior?
A) The Log Server log unification process unifies all log entries from the Security Gateway on a specific connection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minute session timeout, thus each keep-alive packet is considered part of the original logged connection at the beginning of the day.
B) The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt. Because it is encrypted, the R75 Security Gateway cannot distinguish between GRE sessions. This is a known issue with GRE. Use IPSEC instead of the nonstandard GRE protocol for encapsulation.
C) The setting Log does not capture this level of detail for GRE. Set the rule tracking action to Audit since certain types of traffic can only be tracked this way.
D) The Log Server is failing to log GRE traffic properly because it is VPN traffic. Disable all VPN configuration to the partner site to enable proper logging.
3. John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
A) John should install the Identity Awareness Agent
B) Investigate this as a network connectivity issue
C) John should lock and unlock his computer
D) The access should be changed to authenticate the user instead of the PC
4. Which of the following methods is NOT used by Identity Awareness to catalog identities?
A) GPO
B) Identity Agent
C) Captive Portal
D) AD Query
5. Which rule is responsible for the installation failure?
A) Rule 6
B) Rule 3
C) Rule 5
D) Rule 4
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: A | 질문 # 3 정답: D | 질문 # 4 정답: A | 질문 # 5 정답: A |