Questões - WG Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

Fireware Essentials.

49q

Number: Fireware Essentials

Passing Score: 800

Time Limit: 120 min

Fireware Essentials Exam

Exam A

QUESTION 1

You configured four Device Administrator user accounts for your Firebox. To see a report of
witch Device Management users have made changes to the device

configuration, what must you do? (Select two.)

A. Start Firebox System Manager for the device and review the activity for the Management
Users on the Authentication List tab.

B. Connect to Report Manager or Dimension and view the Audit Trail report for your device.

C. Open WatchGuard Server Center and review the configuration history for managed devices.

D. Configure your device to send audit trail log messages to your WatchGuard Log Server or
Dimension Log Server.

QUESTION 2

Which items are included in a Firebox backup image? (Select four.)

https://www.gratisexam.com/

A. Support snapshot

B. Fireware OS

C. Configuration file

D. Log file

E. Feature keys

F. Certificates
QUESTION 3

Only 50 clients on the trusted network of your Firebox can connect to the Internet at the same
time. What could cause this? (Select one.)

A. TheLiveSecurity feature key is expired.

B. The device feature key allows a maximum of 50 client connections.

C. The DHCP address pool on the trusted interface has only 50 IP addresses.

D. The Outgoing policy allows a maximum of 50 client connections.

QUESTION 4

The IP address for the trusted interface on your Firebox is 10.0.40.1/24, but you want to
change the IP address for this interface. How can you avoid a network

outage for clients on the trusted network when you change the interface IP address to
10.0.50.1/24? (Select one.)

A. Create a 1-to-1 NAT rule for traffic from the 10.0.40.0/24 subnet to addresses on the
10.0.50.0/24 subnet.

B. Add 10.0.40.1/24 as a secondary IP address for the interface.

C. Add IP addresses on the 10.0.40.0/24 subnet to the DHCP Server IP address pool for this
interface.

D. Add a route to 10.0.40.0/24 with the gateway 10.0.50.1.

QUESTION 5

In the network configuration in this image, which aliases is Eth2 a member of? (Select three.)

https://www.gratisexam.com/

A. Any-optional

B. Any-External

C. Optional-1

D. Any

E. Any-Trusted
QUESTION 6

Clients on the trusted network need to connect to a server behind a router on the optional
network. Based on this image, what static route must be added to the

Firebox for traffic from clients on the trusted network to reach a server at 10.0.20.100? (Select
one.)

A. Route to 10.0.20.0/24, Gateway 10.0.2.1

B. Route to 10.0.20.0/24, Gateway 10.0.2.254

C. Route to 10.0.20.0, Gateway 10.0.2.254

D. Route to 10.0.10.0/24, Gateway 10.0.10.1

QUESTION 7

The policies in a default Firebox configuration do not allow outgoing traffic from optional
interfaces.

A. True

B. False

QUESTION 8

When you examine the log messages In Traffic Monitor, you see that some network packets
are denied with an unhandled packet log message. What does

this log massage mean? (Select one.)

A. The packet is denied because the site is on the Blocked Sites List.

B. The packet is denied because it matched a policy.

C. The packet is denied because it matched an IPS signature.

D. The packet is denied because it does not match any firewall policies.
QUESTION 9

Which of these actions adds a host to the temporary or permanent blocked sites list? (Select
three.)

A. Enable the AUTO-block sites that attempt to connect option in a deny policy.

B. Add the site to the Blocked Sites Exceptions list.

https://www.gratisexam.com/

C. On the Firebox System Manager >Blocked Sites tab, select Add.

D. In Policy Manager, select Setup> Default Threat Protection > Blocked Sites and click Add.

Correct Answer: ACD

QUESTION 10

Which of these threats can the Firebox prevent with the default packet handling settings?
(Select four.)

A. Access to inappropriate websites

B. Denial of service attacks

C. Flood attacks

D. Malware in downloaded files

E. Port scans

F. Viruses in email messages

G. IP spoofing

QUESTION 11

Users on the trusted network cannot browse Internet websites. Based on the configuration
shown in this image, what could be the problem with this policy

configuration? (Select one.)

A. The default Outgoing policy has been removed and there is no policy to allow DNS traffic.

B. The HTTP-proxy policy has higher precedence than the HTTPS-proxy policy.

C. The HTTP-proxy policy is configured for the wrong port.

D. The HTTP-proxy allows Any-Trusted and Any-Optional to Any-External.


QUESTION 12

If you disable the Outgoing policy, which policies must you add to allow trusted users to
connect to commonly used websites? (Select three.)

A. HTTP port 80

B. NAT policy

C. FTP port 21

D. HTTPS port 443

E. DNS port 53

QUESTION 13

How is a proxy policy different from a packet filter policy? (Select two.)

https://www.gratisexam.com/

A. Only a proxy policy examines information in the IP header.

B. Only a proxy policy uses the IP source, destination, and port to control network traffic.

C. Only a proxy policy can prevent specific threats without blocking the entire connection.

D. Only a proxy works at the application, network, and transport layers to examine all
connection data.

QUESTION 14

Which authentication servers can you use with your Firebox? (Select four.)

A. Active Directory

B. RADIUS

C. LDAP

D. Linux Authentication

E. Kerberos

F. TACACS+

G. Firebox databases
QUESTION 15

When your users connect to the Authentication Portal page to authenticate, they see a
security warning message in their browses, which they must accept before

they can authenticate. How can you make sure they do not see this security warning message
in their browsers? (Select one.)

A. Import a custom self-signed certificate or a third-party certificate to your Firebox and import
the same certificate to all client computers or web browsers.

B. Replace the Firebox certificate with the trusted certificate from your web server.

C. Add the user accounts for your users who use the Authentication Portal to a list of trusted
users on your Firebox.

D. Instruct them to disable security warning message in their preferred browsers.

QUESTION 16

You can configure your Firebox to automatically redirect users to the Authentication Portal
page.

A. True

B. False

QUESTION 17

From the SMTP proxy action settings in this image, which of these options is configured for
outgoing SMTP traffic? (Select one.)

https://www.gratisexam.com/

A. Rewrite the Mail From header for the example.com domain.

B. Deny incoming mail from the example.com domain.

C. Prevent mail relay for the example.com domain.

D. Deny outgoing mail from the example.com domain.


QUESTION 18

You can configure the SMTP-proxy policy to restrict email messages and email content based
on which of these message characteristics? (Select four.)

A. Sender Mail From address

B. Check URLs in message with WebBlocker

C. Email message size

D. Attachment file name and content type

E. Maximum email recipients

QUESTION 19

After you enable spamBlocker, your users experience no reduction in the amount of spam they
receive. What could explain this? (Select three.)

A. Connections cannot be resolved to the spamBlocker servers because DNS is not configured
on the Firebox.

B. The spamBlocker action for Confirmed Spam is set to Allow.

C. The Maximum File Size to Scan option is set too high.

D. A spamBlocker exception is configured to allow traffic from sender *.

E. spamBlocker Virus Outbreak Detection is not enabled.

QUESTION 20

An email newsletter about sales from an external company is sometimes blocked by


spamBlocker. What option could you choose to make sure the newsletter is

delivered to your users? (Select one.)

A. Add a spamBlocker exception based on the From field of the newsletter email.

B. Set the spamBlocker action to quarantine the email for later retrieval.

C. Add a spamBlocker subject tag for bulk email messages.

D. Set the spamBlocker virus outbreak detection action to allow emails from the newsletter
source.
QUESTION 21

Your company denies downloads of executable files from all websites. What can you do to
allow users on the network to download executable files from the

company’s remote website? (Select one.)

A. Add an HTTP proxy exception for the company’s remote website.

B. Create a WebBlocker exception to allow access to the company’s remote website.

C. Create an IPS exception.

D. Create a Blocked Sites exception.

E. Configure HTTP Request > URL Paths to allow the company’s remote website.

QUESTION 22

A user receives a deny message that the installation file (install.exe) is blocked by the HTTP-
proxy policy and cannot be downloaded. Which HTTP proxy action rule

must you modify to allow download of the installation file? (Select one.)

https://www.gratisexam.com/

A. HTTP Request > Request Methods

B. HTTP Response > Body Content Types

C. HTTP Response > Header Fields

D. WebBlocker

E. HTTP Request > Authorization

QUESTION 23

Which takes precedence: WebBlocker category match or a WebBlocker exception?

A. WebBlocker exception

B. WebBlocker category match


QUESTION 24

To prevent certificate error warnings in your browser when you use deep content inspection
with the HTTPS proxy, you can export the proxy authority certificate

from the Firebox and import that certificate to all client devices.

A. True

B. False

QUESTION 25

Which of these options must you configure in an HTTPS-proxy policy to detect credit card
numbers in HTTP traffic that is encrypted with SSL? (Select two.)

A. WebBlocker

B. Gateway AntiVirus

C. Application Control

D. Deep inspection of HTTPS content

E. Data Loss Prevention

QUESTION 26

Match each WatchGuard Subscription Service with its function.

Uses full-system emulation analysis to identify characteristics and behavior of zero-day


malware. (Choose one).

A. Reputation Enable Defense RED

B. Gateway / Antivirus

C. Data Loss Prevention DLP

D. Spam Blocker

E. WebBlocker

F. Intrusion Prevention Server IPS

G. Application Control

H. Quarantine Server

I. APT Blocker
QUESTION 27

When you configure the Global Application Control action, it is automatically applied to all
policies.

A. True

B. False

QUESTION 28

Which WatchGuard Subscription Service must be enabled in a proxy policy before you can use
APT Blocker? (Select one.)

A. RED

B. Application Control

C. Gateway Antivirus

D. WebBlocker

E. IPS

QUESTION 29

What settings must you device configuration file include for Gateway AntiVirus to protect users
on your network? (Select two.)

A. Configure a policy to use a proxy action that has AntiVirus settings configured.

https://www.gratisexam.com/

B. Install the Gateway AntiVirus server on your network.

C. Configure Gateway AntiVirus settings for a proxy action.

https://www.gratisexam.com/

D. Disable automatic signature updates.

E. Decrease the scan limits


QUESTION 30

After you enable Gateway AntiVirus, IPS, or Application control, how can you make sure the
services protect your network from the latest known threats? (Select

one.)

A. Enable default packet handling.

B. Configure reputation Enabled Defense.

C. Enable automatic signature updates.

D. Enable HTTPS deep inspection.

QUESTION 31

Match the monitoring tool to the correct task.

Which is not a Fireware monitoring tool? (Select one)

A. FireBox System Manager – Blocked Sites list

B. Log Server

C. FireWatch

D. Firebox System Manager – Subscription services

E. Firebox System Manager – Authentication list

F. Traffic Monitor

QUESTION 32

Which diagnostic tasks can you run from the Traffic Monitor tab of Firebox System Manager?
(Select four.)

A. DNS lookup

B. MAC address lookup

C. Traceroute

D. Reputation lookup

E. Ping

F. TCP dump
QUESTION 33

How can you include log messages from more than one Firebox in a single report generated by
Dimension? (Select two.)

A. You cannot see report data in Dimension for more than one device.

B. Create a device group and view the reports for that group.

C. Create a report schedule that includes all the devices you want to include in the report.

D. Export report data as a single PDF file for all the devices you want to include in the report.

QUESTION 34

To enable remote devices to send log messages to Dimension through the gateway Firebox,
what must you verify is included in your gateway Firebox

configuration? (Select one.)

A. You can only send log messages to Dimension from a computer that is on the network
behind your gateway Firebox.

B. You must change the connection settings in Dimension, not on the gateway Firebox.

C. You must add a policy to the remote device configuration file to allow traffic to a Dimension.

D. You must make sure that either the WG-Logging packet filter policy, or another policy that
allows external connections to Dimension over port 4115, is included

in the configuration file.

QUESTION 35

Which WatchGuard tools can you use to review the log messages generated by your Firebox?
(Select three).

A. Firebox System Manager > Traffic Monitor

B. Fireware XTM Web UI > Traffic Monitor

C. Firebox System Manager > Status Report

D. Dimension > Log manager

E. WatchGuard System Manager > Policy Manager


QUESTION 36

You can configure your Firebox to send log messages to how many WatchGuard Log Servers at
the same time? (Select one.)

A. One

B. Two

C. As many as you have configured on your network.

QUESTION 37

How can you prevent connections to the Fireware Web UI from computers on optional
interface Eth2? (Select one.)

A. Remove Eth2 from the Any-Optional alias.

B. Remove Any-Optional from the To list of the WatchGuard Web UI policy.

C. Remove Any-Optional from the From list of the WatchGuard policy.

D. Remove Any-Optional from the To list of the WatchGuard policy

E. Remove Any-Optional from the From list of the WatchGuard Web UI policy

QUESTION 38

What is one reason that users could see a certificate warning in their web browsers when they
connect to Fireware XTM Web UI? (Select one.)

A. The Firebox or XTM device uses the default self-signed certificate.

B. The authentication server does not respond after three minutes.

C. The user has been previously added to the Blocked Sites list.

D. The user or group is not present in the Firebox User database.

QUESTION 39

From the Fireware Web UI, you can generate a report that shows your device configuration
settings.

A. True

B. False
QUESTION 40

In this diagram, which branch office VPN tunnel route must you add on the Site A Firebox to
allow traffic between devices on the trusted network at Site A and the

trusted network at site B? (Select one.)

A. Local: 192.168.1.0/24 <--> Remote: 10.0.10.0/24

https://www.gratisexam.com/

B. Local: 203.0.113.10/24 <--> Remote: 198.151.100.2/24

C. Local: 10.0.10.1/24 <--> Remote: 192.168.1.1/24

D. Local: 10.0.10.0/24 <--> Remote: 192.168.1.0/24

QUESTION 41

You can use Firebox-DB authentication with any type of Mobile VPN.

A. True

B. False

QUESTION 42

Which tool is used to see a treemap visualization of the traffic through your Firebox? (Select
one)

A. FireBox System Manager – Blocked Sites list

B. Log Server

C. FireWatch

D. Firebox System Manager – Subscription services

E. Firebox System Manager – Authentication list

F. Traffic Monitor
QUESTION 43

Which tool can add an IP address for the Firebox to permanently block? (Select one)

A. FireBox System Manager – Blocked Sites list

B. Log Server

C. FireWatch

D. Firebox System Manager – Subscription services

E. Firebox System Manager – Authentication list

F. Traffic Monitor

QUESTION 44

Match the monitoring tool to the correct task.

Which tool can ping the source of a denied packet? (Select one)

A. FireBox System Manager – Blocked Sites list

B. Log Server

C. FireWatch

D. Firebox System Manager – Subscription services

E. Firebox System Manager – Authentication list

F. Traffic Monitor

QUESTION 45

Match the monitoring tool to the correct task.

Which tool can learn the status of your IPS signature database? (Select one)

A. FireBox System Manager – Blocked Sites list

B. Log Server

C. FireWatch

D. Firebox System Manager – Subscription services

E. Firebox System Manager – Authentication list

F. Traffic Monitor
QUESTION 46

Match each WatchGuard Subscription Service with its function.

Manages use of applications on your network. (Choose one).

A. Reputation Enable Defense RED

B. Data Loss Prevention DLP

C. Intrusion Prevention Server IPS

D. Application Control

E. APT Blocker

QUESTION 47

Match each WatchGuard Subscription Service with its function.

A repository where email messages can be sent based on analysis by spamBlocker, Gateway
AntiVirus, or Data Loss Prevention. (Choose one).

A. Gateway / Antivirus

B. Data Loss Prevention DLP

C. Spam Blocker

D. Intrusion Prevention Server IPS

E. Quarantine Server

QUESTION 48

Match each WatchGuard Subscription Service with its function.

Cloud based service that controls access to website based on a site’s previous behavior.
(Choose one).

A. Reputation Enable Defense RED

B. Data Loss Prevention DLP

C. WebBlocker

D. Intrusion Prevention Server IPS

E. Application Control

F. Quarantine Server
QUESTION 49

Match each WatchGuard Subscription Service with its function.

Scans files to detect malicious software infections. (Choose one).

A. Reputation Enable Defense RED

B. Gateway / Antivirus

C. Data Loss Prevention DLP

D. Spam Blocker

E. Quarantine Server

You might also like