0% found this document useful (0 votes)
116 views6 pages

Sophos Firewall Question 3

The document outlines various features and functionalities of the Sophos Firewall v21.0, including deployment, authentication methods, web protection, remote access, and management. It poses multiple questions related to these topics, requiring knowledge of specific configurations and capabilities of the firewall. The content serves as a guide for understanding and utilizing the Sophos Firewall effectively.

Uploaded by

ehpp2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views6 pages

Sophos Firewall Question 3

The document outlines various features and functionalities of the Sophos Firewall v21.0, including deployment, authentication methods, web protection, remote access, and management. It poses multiple questions related to these topics, requiring knowledge of specific configurations and capabilities of the firewall. The content serves as a guide for understanding and utilizing the Sophos Firewall effectively.

Uploaded by

ehpp2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1. v21.

0 Overview and Deployment

1. TRUE or FALSE. Sophos Firewall hardware devices come pre-


loaded with software.

2. What type of encryption does Sophos Firewall make use of for


one way message encryption?
This answer can be found in the Sophos Firewall Features and the
Attack Kill Chain chapter.

3. Which 2 of these are features of the Xstream architecture?


This answer can be found in the What is Sophos Firewall chapter.

4. Which Sophos Firewall Feature is able to identify and block


infected clients from being able to communicate with a command-
and-control server?

2. v21.0 Getting Started


1. Look at the image below.

What type of object is this?

2. Which 2 types of zone can be created on the Sophos Firewall?

3. Which zone is the most secure by default and is for your


internal networks
This answer can be found in the Getting Started with Zones and
Interfaces on Sophos Firewall chapter.
4. You want to a certificate on Sophos Firewall that will be signed
by your domain registrar. Which option should you select?

3. v21.0 Base Firewall and Network Protection


1. TRUE or FALSE. NAT rules require firewall rules to allow
traffic.

2. Which of the following DoS and spoof protection modes will


drop packets if the IP and MAC do not match with any entry in the
IP-MAC trusted list?

3. What 2 ways can you register Sophos Firewall with Sophos


Central?

4. Which 2 of the following statements correctly describe how


firewall rules are applied?

5. Users complain that when working long hours, they often lose
access to Internet resources.
Looking at the configuration of the rule above, what is causing this?

4. v21.0 Firewall Icons


1. Which firewall icon shown represents a rule group?
5. v21.0 Site-to-Site Connections
1. TRUE or FALSE. All IPsec and SSL site-to-site or remote
access VPN connections are automatically added to the VPN zone.

2. What is the default SSL VPN port?

3. You are in the process of deploying multiple RED devices. Due


to bandwidth issues at the head office, which 2 modes of
deployment could be used so that only necessary traffic is routed
back to the head office?

4. Which RED mode matches this description? All traffic


generated on the remote network is sent through the RED to
Sophos Firewall.

5. Which 2 VPN protocols does Sophos Firewall support for site-


to-site VPNs? (Excluding RED site-to-site VPN).

6. v21.0 Authentication
1. Which 2 methods are supported for logoff detection when using
STAS?

2. Which 2 of the following are methods of Sophos Firewall


authentication?

3. What type of user can be created to allow temporary access to


resources with the least amount of effort?
This answer can be found in the Getting Started with Sophos
Firewall Authentication chapter.

4. You need to create a user account to authenticate a VoIP


system that needs access to the Internet. The system does not
have the ability to authenticate with your directory service. What
type of user would you create to accomplish this?
This answer can be found in the Getting Started with Sophos
Firewall Authentication chapter.

7. v21.0 Web Protection and Application Control


1. Which of these options IS supported when using the DPI
Engine for Web Protection?
This answer can be found in the Configuring Web Protection on
Sophos Firewall chapter.

2. Web policy rules apply to which 2 of the following?

3. Which 3 of the following features are provided by application


control?
This answer can be found in the Getting Started with Application
Control on Sophos Firewall chapter.

4. Which 3 of the following features are provided by Cloud


Applications on the Sophos Firewall?

5. Which web filtering method can offload traffic to the FastPath?


This answer can be found in the Sophos Firewall Web Protection
Overview chapter.

8. v21.0 Web Quota


1. You have been asked to create a surfing quota for guests that
allows access to the Internet for 20 hours in a week and then
terminates the connection with no recurrence.

Which image shows the best way to configure the surfing quota?

9. v21.0 Remote Access


1. Which 2 protocols does the Sophos Connect IPsec VPN client
support?
2. Where can an end user download the Sophos Connect VPN
client from to install on their workstation?

3. Sophos Firewall hosts the SSL VPN on which port by default?


This answer can be found in the Getting Started with Remote
Access VPNs on Sophos Firewall chapter.

4. When you download the IPsec remote access configuration


you have two configuration files. Which file type includes the
advanced configuration?

10. v21.0 Wireless Protection


1. Which client traffic mode creates a VXLAN between the access
point and a wireless interface on the Sophos Firewall?

2. What 2 of the following are methods that can be used to allow


access to a wireless hotspot on the Sophos Firewall?

11. v21.0 Logs and Reports


1. You are checking the application risk meter which is reporting a
risk score of 4.2. Which of the following statements are true in this
circumstance?

2. What is the maximum number of external syslog servers you


can configure on Sophos Firewall?

12. v21.0 Central Management


1. Which 4 of the following statements are TRUE about SD-WAN
connection groups in Sophos Central?
This answer can be found in the Managing Sophos Firewall in
Sophos Central chapter.

2. Which of the following statements is TRUE about Firewall


Management in Sophos Central?

3. How much storage is included with each Central Firewall


Reporting Advanced license in GB? (enter a numerical value)

You might also like