Your company denies downloads of executable files from all websites. What can you do to allow users on the network to download executable files from the company"™s remote website? (Select one.)
Answer : A
A user receives a deny message that the installation file (install.exe) is blocked by the HTTP-proxy policy and cannot be downloaded. Which HTTP proxy action rule must you modify to allow download of the installation file? (Select one.)
Answer : B
Which takes precedence: WebBlocker category match or a WebBlocker exception?
Answer : A
To prevent certificate error warnings in your browser when you use deep content inspection with the HTTPS proxy, you can export the proxy authority certificate from the Firebox and import that certificate to all client devices.
Answer : A
Which of these options must you configure in an HTTPS-proxy policy to detect credit card numbers in HTTP traffic that is encrypted with SSL? (Select two.)
Answer : DE
Match each WatchGuard Subscription Service with its function.
Uses full-system emulation analysis to identify characteristics and behavior of zero-day malware. (Choose one).
Answer : I
APT Blocker is intended to stop malware and zero-day threats that are trying to invade an organization's network.
APT Blocker uses a next-gen sandbox to get detailed views into the execution of a malware program. After first running through other security services, files are fingerprinted and checked against an existing database "" first on the appliance and then in the cloud. If the file has never been seen before, it is analyzed using the system emulator, which monitors the execution of all instructions. It can spot the evasion techniques that other sandboxes miss.
Reference:
http://www.watchguard.com/wgrd-products/security-modules/apt-blocker
When you configure the Global Application Control action, it is automatically applied to all policies.
Answer : B
Which WatchGuard Subscription Service must be enabled in a proxy policy before you can use APT Blocker? (Select one.)
Answer : C
What settings must you device configuration file include for Gateway AntiVirus to protect users on your network? (Select two.)
Answer : AC
When you enable Gateway AntiVirus, you must set the actions to be taken if a virus or error is found in an email message (SMTP or POP3 proxies), web page download or upload post (HTTP proxy), or uploaded or downloaded file (FTP proxy). When Gateway AntiVirus is enabled, it scans each file up to a specified kilobyte count. Any additional bytes in the file are not scanned. This allows the proxy to partially scan very large files without a large effect on performance.
Reference:
http://watchguard.com/help/docs/webui/xtm_11/en-us/content/en-us/services/gateway_av/av_actions_config_c.html
After you enable Gateway AntiVirus, IPS, or Application control, how can you make sure the services protect your network from the latest known threats? (Select one.)
Answer : C
Which policies can use the Intrusion Prevention Service to block network attacks? (Select one?)
Answer : C
Which of these services would you use to allow the use of P2P programs for a specific department in your organization? (Select one.)
Answer : B
You can use Firebox System Manager to download a PCAP file that includes packet information about the protocols that manage traffic on your network.
Answer : A
From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them.
Answer : A
Match the monitoring tool to the correct task.
Which is not a Fireware monitoring tool? (Select one)
Answer : B
The Fireware monitor and configuration tools are: Edge Web Manager, Firebox System Manager, HostWatch, and Ping.
Reference: Fireware Basics, Courseware: WatchGuard System Manager 10, pages 15, 34, 59, 181
Have any questions or issues ? Please dont hesitate to contact us