0% found this document useful (0 votes)
268 views3 pages

Sophos Firewall Features and Configuration Guide

The document outlines various features and configurations of the Sophos Firewall, including application identification, routing options, and security settings. It covers topics such as VPN protocols, authentication servers, web filtering methods, and firewall rules. Additionally, it addresses deployment modes and troubleshooting tips for effective firewall management.

Uploaded by

Franco Volschenk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
268 views3 pages

Sophos Firewall Features and Configuration Guide

The document outlines various features and configurations of the Sophos Firewall, including application identification, routing options, and security settings. It covers topics such as VPN protocols, authentication servers, web filtering methods, and firewall rules. Additionally, it addresses deployment modes and troubleshooting tips for effective firewall management.

Uploaded by

Franco Volschenk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Correct

Which feature of the sophos Firewall identifies unknow applications?


Synchronized App Controll

When configuring a route which of the following allows you to select traffic for
routing based on user and application
SD-WAN policy Route

You are preparing a hardware Sophos Firewall for installation on a remote site, the
order for the license has not been processed. Which devices registration option do
you select in the initial setup wizard.
I do not want to register now

Which interface type allows two or more interfaces to be used to create a


transparent layer 2 or 3 bridgeinterface for seamless communication between
interfaces.
Bridge

Which feature can harden form, sign cookies and scan for malware
Web Server Protection

The Firewall rule ID is the same as the rule potition


False

Which firewall icon shown represents a network rule that allows traffic.
D(Green share)

You need to re-provision several RED devices following the replaced of your Sophos
firewall/Where can you find the RED unlock codes to re-provision the REDs to a new
Sophos Firewall.
In an email from Sophos the first time RED's were provisioned

When creating a site-to-site VPN between a Sophos Firewall and another vendo's
firewall, what is the best protocol to use?
IPsec

Which 4 of the following are supported external authentication servers on Sophos


Firewall
LDAP
eDirectory
RADIUS
Active Directory

When using STAS where in the network can the agent software be installed and
configured
On a Microsoft Active Directory server in the network

Which 3 of the following actions do you need to complete for Synchronized User ID
to work.
Enable the Active Directory server as an authentication source for the firewall
Connect the Sophos Firewall to sophos Central
Configure an Active Directory Authnetication server on the Sophos Firewall

Which Directory service is supported by STAS when used with a Sophos Firewall.
Microsoft Active Directory

Web filtering on Sophos firewall can be deployed in which 2 ways


Explicit
Transparent
Web policy rules apply to which 2 of the following
Users
Groups

Keyword libraries can be uploaded to Sophos Firewall and applied to any web
filtering policy as an added criteria with actions to log and monitor or block
search
True

The Sophos Firewall lite implimintation of cloud access security broker blocksall
cloud application by default
True

You want to encrypt emails that contain financial data using SPX before they leave
the network when 2 steps do you need to take.
Select Data Protection CCLs in Email Protection
Configure the Data Protection section in the SMTP policy to accept with SPX

When replying to an SPX encryption email recipient would also need to have a sophos
Firewall SPX configured for their reply to the encrypted
False

The SSL VPN and User Portal can share the same port.
True

What is the Clientless Access portal used for.


To provide access to internal recources without the need for a VPN client to be
installed

Which of the following best describe the bridges to AP LAN security mode for
wireless networks.
Wireless traffic is routed from the AP directoly onto the LAN

What is the maximum number of external syslog servers you can configure on Sophos
Firewal.
5

Which metric can be used to identify risky users who are responding to spear
phising attempts.
User Threat Quotient(UTQ)

When using Central Firewall Management which of the following statement is true
Sophos Firewall are not assigned a group by default

How much storage is included with each Central Firewall Reporting Advanced
Licensing in GB Enter the awnser as numerical digits only
100GB

Application rules are applied to users and groups


False

Sophos Firewall is Supported on any public cloud


False

Which deployment mode can be used fo evaluation the capabilities of Sophos Firewall
witjout making any network changes
Discovery mode

Which 3 of the following are the default decryption profiles available in Sophos
Firewall
Maximum compatibility
Block insecure
Strict compliance

During troubleshooting you do not see as much information in the log files as you
were expecting what setting needs to be changed to see all the traffic passing
through a firewall rule.
(Network protection in the firewall rules and NAT section)

Which 2 of the following statements correctly describe how firewall rules are
applied.
Packets are tested against firewall rules in order and the first match is used.
Packets that don't match a firewall rule are dropped

Which of the following DoS and spoof protection modes will drop packets if the
source IP address does not match an entry on the firewall's routing table.
IP Spoofing

Which is the control port used in RED connections?


TCP3400

Which 3 of the followinf forms of access can be secured using one-time passwords.
USer portal
SSL and IPsSec VPN
L2TP VPN

Which of the following best describes the Bridge to VLAN security mode for wireless
Allows the wireless network to extend the VLAN

How do you enable and disable IPsec VPN


(Simulation 4.2)

You hve configured one-time password. John smith is trying to login to User Portal
his password is 'firewall'
(Task 5.4)

You have configured destination-based security Heartbeat in the firewall rule shown
here.
Which zone does not support Security Heatbeat?
WAN

After enabling ATP in the Sophos Firewall you test the ATP policy and cannot get
the block page appear you examine the configuration to see what is misconfigured.
(Unkown)

You might also like