0% found this document useful (0 votes)
2K views4 pages

Sphots ET80Questions + Answers

Uploaded by

clist829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views4 pages

Sphots ET80Questions + Answers

Uploaded by

clist829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Z3ZIVZMI[ ERH(ITPS]Q IRX

1. TRUE or FALSE. Sophos Firewall hardware devices come pre-loaded with software.

2. Which deployment mode can protect web servers from common attacks?

3. Which feature of the Sophos Firewall helps prevent an infected computer from transmitting personal
information out of their network?
This answer can be found in the Sophos Firewall Features and the Attack Kill Chain chapter.

4. Which 4 of the following are tested and supported virtualization platforms for Sophos Firewall?


Z+IXXMRK7XEVXIH
1. In which 3 ways can you add a certificate that can be used in place of the default Appliance
Certificate?

2. What do you need to configure before you can start using traffic shaping?

3. Which interface type allows standard routing to be used to send traffic over the VPN?


Z&EWI*MVI[ EPPERH2 IX[ SVO4VSXIGXMSR
1. Which of the following rules allows traffic to traverse the NAT in the opposite direction?
This answer can be found in the Getting Started with Firewall and NAT Rules on Sophos Firewall chapter.

2. What information does Sophos Firewall share about devices with a RED health status to prevent
lateral movement protection?
This answer can be found in the Getting Started with Security Heartbeat on Sophos Firewall chapter.

3. Which of the following drops traffic that is trying to pretend to come from a different MAC or IP
address to bypass protection?

4. Which 3 of the following are matching criteria Sophos Firewall uses to automatically assign firewall
rules to groups?
This answer can be found in the Getting Started with Firewall and NAT Rules on Sophos Firewall chapter.


Z*MVI[ EPP-GSRW
1. Which firewall icon shown represents a rule group?


Z7MXIXS7MXI'SRRIGXMSRW
1. Which 2 ports do Remote Ethernet Devices use?
This answer can be found in the Getting Started with Remote Ethernet Devices on Sophos Firewall
chapter.

2. Which RED mode matches this description? All traffic generated on the remote network is sent
through the RED to Sophos Firewall.

3. TRUE or FALSE. RED connections are always automatically added to the VPN zone.
This answer can be found in the Connecting Sites with Sophos Firewall chapter.

4. What is required to successfully build an IPsec VPN tunnel?


Z%YXLIRXMGEXMSR
1. When using STAS, where in the network can the agent software be installed and configured?
This answer can be found in the Getting Started with Sophos Firewall Authentication chapter.

2. TRUE or FALSE: In Sophos Firewall version 20.0 users can authenticate with the captive portal
using Azure AD SSO.

3. TRUE or FALSE: Azure AD SSO on Sophos Firewall requires a paid tier of Azure AD.

4. TRUE or FALSE. The Sophos Chromebook User ID app is deployed to Chromebooks from the
Sophos Firewall.
This answer can be found in the Getting Started with Sophos Firewall Authentication chapter.

5. A user is a member of multiple Active Directory groups. What will happen when they first login to
Sophos Firewall?
The answer can be found in Configuring Authentication Servers and Services on Sophos Firewall


Z; IF4VSXIGXMSR
1. When testing a new web policy, you are still able to access pages that should be blocked. What is
the most likely reason for this?
This answer can be found in the Configuring Web Protection on Sophos Firewall chapter.

2. Which of these options IS supported when using the DPI Engine for Web Protection?
This answer can be found in the Configuring Web Protection on Sophos Firewall chapter.

3. Which method would you use to limit bandwidth for a single website?

4. TRUE or FALSE. Web protection exceptions apply to all web protection policies no matter when
they are applied in the Sophos Firewall.


Z; IF5YSXE
1. You have been asked to create a surfing quota for guests that allows access to the Internet for 20 hours in
a week and then terminates the connection with no recurrence.
Which image shows the best way to configure the surfing quota?
This answer can be found in the Sophos Firewall Web Protection Quotas and Traffic Shaping chapter.


Z%TTPMGEXMSR'SRXVSP
1. TRUE or FALSE. It is possible to apply a default application traffic shaping policy to all traffic.

2. TRUE or FALSE. Application rules are applied to users and groups.


This answer can be found in the Getting Started with Application Control on Sophos Firewall chapter.

3. Which 4 of the following can traffic shaping policies be associated with?


This answer can be found in the Application Traffic Shaping on Sophos Firewall chapter.

4. TRUE or FALSE. The Sophos Firewall's lite implementation of Cloud Access Security Broker blocks
all cloud applications by default.
This answer can be found in the Getting Started with Application Control on Sophos Firewall chapter.


Z6IQ SXI%GGIWW
1. TRUE or FALSE: The SSL VPN and User Portal can share the same port?

2. When using Sophos Firewall as a ZTNA gateway, how much bandwidth is allowed per user per
month in gigabytes? (Enter the number in digits)

3. When using ZTNA, how long is the Azure authentication token valid for by default? (Enter the
number of days in digits)
The answer can be found in the Getting Started with ZTNA on Sophos Firewall chapter.

4. Where can an end user download the Sophos Connect VPN client from to install on their
workstation?
This answer can be found in the Getting Started with Remote Access VPNs on Sophos Firewall chapter.


Z; MVIPIWW
1. TRUE or FALSE. DHCP can be used to override the wireless magic IP if the Sophos Firewall is not
the default gateway.
2. Which client traffic mode routes traffic to a specific VLAN using the first device it encounters that
can route the VLAN traffic?


Z0SKKMRKERH6ITSVXMRK
1. Where would you view information on files that have been referred to Sophos' zero-day protection?
This answer can be found in the Running and Customizing Reports on Sophos Firewall chapter.

2. Which reporting metric can be used to identify risky users who are responding to spear phishing
attempts?


Z'IRXVEP*MVI[ EPP1 EREKIQ IRX
1. Which option must be enabled before you can start managing your Sophos Firewall in Sophos
Central?

2. How much storage is included with each Central Firewall Reporting Advanced license in GB? (enter
a numerical value)
This answer can be found in the Firewall Reporting in Sophos Central chapter.

You might also like