SonicWALL Basic Administration
Questions and Answers
A customer has an established base of GVC VPN users with a WAN GroupVPN policy
configured. The customer wants to begin an implementation for SSL VPN users. The
existing group of GVC VPN users must be converted to SSL VPN users because the
SonicWALL security appliance does not support both types of VPN users. - Answer -
FALSE
SSL VPN eliminates the need for remote access authentication. - Answer -FALSE
Which of the following correctly describes how a bandwidth management rule works?
-Can be configured for all VPN traffic
-Only applies to outbound traffic from the firewall to the WAN or any other destination
-Can be configured only for individual VPN Security Associations
-Only applies to inbound traffic from the WAN to the firewall - Answer -Can be
configured for all VPN traffic
What are the benefits provided by a VPN (select all that apply)?
-Securely connects distributed networks together
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication - Answer --Securely connects
distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication
What benefits are provided by a VPN (select all that apply)?
The default firewall access rule allows all communication from the LAN to the Internet.
-True
-False - Answer --True
What are two advantages of a multiple firewall?
-Protects restricted special resources
-Offers protection from external attacks while each network segment has free access to
other segments
-Helps protect entire departments - Answer -What are two advantages of a multiple
firewall?
-Protects restricted special resources
What is the purpose of a security policy?
-To authenticate the process by which users and devices are identified and granted
access to the network
-To monitor the network security and make sure the firewall is configured properly to
prevent inappropriate usage
-To make it more difficult for hackers to locate a security hole in a network's gateway
-To describe how a company wants to approach security, including rules of conduct and
the determination of acceptable risk - Answer --To describe how a company wants to
approach security, including rules of conduct and the determination of acceptable risk
What question would you ask to get specific information on user restrictions?
-What kinds of network traffic will you allow?
-Will the computers be locked away from the public, or will they have access to the
hardware?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller UPPERFRONT. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.