Correct
Which feature of the sophos Firewall identifies unknow applications?
Synchronized App Controll
When configuring a route which of the following allows you to select traffic for
routing based on user and application
SD-WAN policy Route
You are preparing a hardware Sophos Firewall for installation on a remote site, the
order for the license has not been processed. Which devices registration option do
you select in the initial setup wizard.
I do not want to register now
Which interface type allows two or more interfaces to be used to create a
transparent layer 2 or 3 bridgeinterface for seamless communication between
interfaces.
Bridge
Which feature can harden form, sign cookies and scan for malware
Web Server Protection
The Firewall rule ID is the same as the rule potition
False
Which firewall icon shown represents a network rule that allows traffic.
D(Green share)
You need to re-provision several RED devices following the replaced of your Sophos
firewall/Where can you find the RED unlock codes to re-provision the REDs to a new
Sophos Firewall.
In an email from Sophos the first time RED's were provisioned
When creating a site-to-site VPN between a Sophos Firewall and another vendo's
firewall, what is the best protocol to use?
IPsec
Which 4 of the following are supported external authentication servers on Sophos
Firewall
LDAP
eDirectory
RADIUS
Active Directory
When using STAS where in the network can the agent software be installed and
configured
On a Microsoft Active Directory server in the network
Which 3 of the following actions do you need to complete for Synchronized User ID
to work.
Enable the Active Directory server as an authentication source for the firewall
Connect the Sophos Firewall to sophos Central
Configure an Active Directory Authnetication server on the Sophos Firewall
Which Directory service is supported by STAS when used with a Sophos Firewall.
Microsoft Active Directory
Web filtering on Sophos firewall can be deployed in which 2 ways
Explicit
Transparent
Web policy rules apply to which 2 of the following
Users
Groups
Keyword libraries can be uploaded to Sophos Firewall and applied to any web
filtering policy as an added criteria with actions to log and monitor or block
search
True
The Sophos Firewall lite implimintation of cloud access security broker blocksall
cloud application by default
True
You want to encrypt emails that contain financial data using SPX before they leave
the network when 2 steps do you need to take.
Select Data Protection CCLs in Email Protection
Configure the Data Protection section in the SMTP policy to accept with SPX
When replying to an SPX encryption email recipient would also need to have a sophos
Firewall SPX configured for their reply to the encrypted
False
The SSL VPN and User Portal can share the same port.
True
What is the Clientless Access portal used for.
To provide access to internal recources without the need for a VPN client to be
installed
Which of the following best describe the bridges to AP LAN security mode for
wireless networks.
Wireless traffic is routed from the AP directoly onto the LAN
What is the maximum number of external syslog servers you can configure on Sophos
Firewal.
5
Which metric can be used to identify risky users who are responding to spear
phising attempts.
User Threat Quotient(UTQ)
When using Central Firewall Management which of the following statement is true
Sophos Firewall are not assigned a group by default
How much storage is included with each Central Firewall Reporting Advanced
Licensing in GB Enter the awnser as numerical digits only
100GB
Application rules are applied to users and groups
False
Sophos Firewall is Supported on any public cloud
False
Which deployment mode can be used fo evaluation the capabilities of Sophos Firewall
witjout making any network changes
Discovery mode
Which 3 of the following are the default decryption profiles available in Sophos
Firewall
Maximum compatibility
Block insecure
Strict compliance
During troubleshooting you do not see as much information in the log files as you
were expecting what setting needs to be changed to see all the traffic passing
through a firewall rule.
(Network protection in the firewall rules and NAT section)
Which 2 of the following statements correctly describe how firewall rules are
applied.
Packets are tested against firewall rules in order and the first match is used.
Packets that don't match a firewall rule are dropped
Which of the following DoS and spoof protection modes will drop packets if the
source IP address does not match an entry on the firewall's routing table.
IP Spoofing
Which is the control port used in RED connections?
TCP3400
Which 3 of the followinf forms of access can be secured using one-time passwords.
USer portal
SSL and IPsSec VPN
L2TP VPN
Which of the following best describes the Bridge to VLAN security mode for wireless
Allows the wireless network to extend the VLAN
How do you enable and disable IPsec VPN
(Simulation 4.2)
You hve configured one-time password. John smith is trying to login to User Portal
his password is 'firewall'
(Task 5.4)
You have configured destination-based security Heartbeat in the firewall rule shown
here.
Which zone does not support Security Heatbeat?
WAN
After enabling ATP in the Sophos Firewall you test the ATP policy and cannot get
the block page appear you examine the configuration to see what is misconfigured.
(Unkown)