Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Which 4 of the following statements are TRUE about SD-WAN connection groups in Sophos Central?

Can include Sec


Can be configured for specific users and groups
Can only provide access to TCP/UDP resources
Can limit access to authenticated users
Can automatically create firewall rules
Requires 2 or more firewalls
You have been asked to install STAS on your servers. Which 3 of the following are required for the installation to be successful?
An account with acc
An IIS Server
Active Directory
An account with logon as a service rights
A SQL Server
Which Sophos Firewall feature can be used to limit the amount of bandwidth an application can use?
Ap
Synchronized application control
Traffic shaping
Surfing quotas
You have created a report that displays data that you wish to check on a daily basis. How can you make this data easily available in the
Create a b
Add a shortcut to the report into the Control Center
Add the report to the index in Sophos Firewall
Pin the report to the report menu
When creating a firewall rule to allow traffic that matches a DNAT rule, what destination IP should be used?

Post-NAT
TRUE or FALSE. Applications which have been discovered via synchronized application control can be added as a traffic selector under

TRUE

Which of the VLAN numbers below when configured acts like a trunk port for the vSwitch?

0
1
4095
You want to perform a packet capture in the Web Admin to review the routing
when you make a HTTP request to 192.168.16.30. What BPF string would
you use?
host 192.168.16.30 and port 80

As part of the initial setup wizard, Sophos Firewall will create a default rule for outbound traffic. Which of the following options in the initia
Protect users from su
Send suspicious files to Sophos Sandstorm
Protect users from network threats
Scan files that were downloaded from the web for m
Where would you configure which cipher algorithms to block?
TLS in
Decryption profile
TLS inspection rule
Certificate authorities
What command would you run on the console to see which type of routes are being processed first?

system route_precedence set static sdwan_policyroute vpn

Which of the following DoS and spoof protection modes will drop packets if the source IP address does not match an entry on the firewal

MAC filter
IP Spoofing
You have created a DNAT rule for server access and are now creating a firewall rule to allow the traffic. What destination zone do you us
The
The post-NAT zone
The zone the Sophos Firewall interface is in

When creating a NAT rule which option allows you to select different source NATs based on the outbound interface within a single rule?

Lo
Reflexive policy
Outbound interface
Override source translation (SNAT)
Which 2 VPN protocols does Sophos Firewall support for site-to-site VPNs?

PPTP
FTP
IPsec
RSA
SSL

When the primary STA collector in a group fails, how does the new primary collector get the current list of live users?

The new primary collector req


The Sophos Firewall provides its current live users
The collectors keep the live users list synchronized
The new primary collector's live users list is already
When configuring STAS, what is the maximum number of Collectors you can have in a Collector group?

5
1
Which mesh role connects to the network via an Ethernet connection?

mes
root access point

You are in the process of deploying multiple RED devices. Due to bandwidth issues at the head office, which 2 modes of deployment cou

Sta
Standard/Split
Transparent/Split
Which of the following DoS and spoof protection modes will drop packets if the IP and MAC do not match with any entry in the IP-MAC tr

MAC filter
IP Spoofing

Which of the following drops traffic that is trying to pretend to come from a different MAC or IP address to bypass protection?

DoS Protection
Spoof Protection
You are configuring Security Heartbeat in a firewall rule that allows computers connected on the LAN to access intranet servers. You wa
Which configuration should you use?

D
C
A

Which is the control port used in RED connections?

UDP: 3480
UDP: 50
UDP: 3410
TCP: 443
Which deployment mode is also known as transparent or inline mode?
Web Appl
Gateway Mode
Discover Mode
Bridge Mode

Which of the following statements about zero-touch deployment in Sophos Central are TRUE?
Zero-touch configura
Zero-touch configuration rules can only be applied by an administrator
Zero-touch configuration rules can only be created for unregistered hardw
Zero-touch configuration rules can only be used with pre-registered XGS
How much storage is included with each Central Firewall Reporting Advanced license in GB? Enter the answer in digits.
100

Which reporting metric can be used to identify risky users who are responding to spear phishing attempts?
Web Report
User Threat Quotient (UTQ)
Compliance report
Which deployment mode can protect web servers from common attacks?

Gateway Mode
Discover Mode
Web Application Firewall (WAF)
Which 3 of the following features are provided by Cloud Applications on the Sophos Firewall?

Filter cloud application data


Identify cloud applications being used
Identification of risky behavior
Classify cloud applications
Which mesh role connects to the network wirelessly?

mesh access point

Which 2 protocols does the Sophos Connect IPsec VPN client support?

PPTP
SSL
IPsec

You have been asked to create a surfing quota for guests that allows access to the Internet for 20 hours in a week and then terminates th
Which image shows the best way to configure the surfing quota?

C
B
A

if you are using the Sophos Firewall as an explicit proxy, which web filtering option will be used?

DPI
Web Proxy
TRUE or FALSE. Keyword libraries can be uploaded to Sophos Firewall and applied to any web filtering policy as an added criteria with a

FALSE

Which method controls the amount of time users and groups spend on the Internet and applies to all Internet traffic?

Traffic shaping policies


Web policy rule quota
Sophos Firewall hosts the SSL VPN on which port by default?

8443

When you download the IPsec remote access configuration you have two configuration files. Which file type includes the advanced confi

.xmlA50
.json
.ovpn
.scx
Complete the URL address for Sophos' support website? www.sophos.com/____________

en-us/support

You are checking the application risk meter which is reporting a risk score of 4.2. Which of the following statements are true in this circum
There is
There are users performing risky actions on the network
There are some users showing risky behavior at a low level

You might also like