ET80
ET80
ET80
You are preparing a hardware XG Firewall for installation on a remote site. The order for the license
has not yet been processed. Which device registration option do you select in the Initial Setup
wizard?
I do not want to register now
You have created a report that displays data that you wish th check on a daily basis. How can you
make this data easily available in the WebAdmin interface?
Create a bookmark fort he report
One computer has a red health status. On which 2 of the networks can the endpoints be protected
from the computer with a red health status?
A
C
Which of 2 features are required if you want to make usw of lateral movement protection?
Server or endpoint protection
Intercept X
Which XG Firewall feature is able to block access to command and control servers?
Advanced Threat Protection (ATP)
Which 2 methods are supported for logoff detection when using STAS?
PING
Workstation Polling
Type the name of the only zone that cannot have a physical port or interface assigned to it.
Vpn
TRUE or FALSE: DHCP can be used to override the magic IP if the XG Firewall is not the default
gateway.
TRUE
C
Which page lists all current applications that are connecting through the XG Firewall?
Lice connections
What do you need to do in order to use NTLM and Kerberos for web authentication?
Enable AD SSO per zone on the Device Access page
TRUE or FALSE: The XG Firewall’s lite implementation of Cloud Access Security Broker blocks all cloud
applications by default.
FALSE
Below is an image oft he XG Firewall Control Center. From here, what would you click to access the
Policy Test simulator?
Log viewer
Which 4 of the following are supportted external authentication servers on Sophos XG Firewall 18.0?
eDirectory
RADIUS
Active Directory
LDAP
TRUE or FALSE: The option to create loopback and reflexive NAT rules is only available when adding a
NEW NAT rule, not when editing an existing NAT rule.
TRUE
Which 3 options should be configured to ensure the most secure scanning settings are in place to
protect users as they browse the web?
Malware scan mode: Batch
Engine selection: Dual engine
Unscannable content: Block
Which deployment mode can protect web servers from common attacks?
Web Application Firewall (WAF)
What 2 of the following are methods that can be used to allow access to a wireless hotspot on the XG
Firewall?
Voucher
Password of the Day
Which metric can be used to identify risky users who are responding to speak phishing attemts?
User Threat Quotient (UTQ)
You have configured one-time passwords. John Smith is trying to login to the User Portal; his
password ‚xgfirewall‘. Below you can see the login screen and his token.
Xgfirewall396145
Where can an end user download the SSL VPN client from to install on their workstation?
User Portal
Which oft he following Do Sand spoof protection modes will drop packets if the source MAC address
is not configured as a trusted MAC?
MAC Filter
Which 2 of the following statements correctly describe how firewall rules are applied?
Packets that don’t match a firewall rule are dropped and logged
Packets are tested against firewall rules in order and the first match is used
TRUE or FALSE: The Sophos Chromebook User ID app is deployed to Chromebooks from the XG
Firewall.
FALSE
You are working with sensitive corporate data and want to ensure that traffic from remote locations
is monitored and blocked from leaving the corporate LAN. What would be the most appropriate
security mode to deploy the RED devices in?
Transparent/Split
When creating a NAT rule which option allows you to select different source NATs based on the
outbound interface within a single rule?
Override source translation (SNAT)
Which 2 methods can be used to generate one-time passwords for authenticating with the XG
Firewall?
Hardware Token
Software Token