2023-2024
Chapter 1
1. Lateral movement protection is made possible by which of the following?
- Synchronized Security
2. Which 2 of these are features of the Xstream architecture?
- TLS 1.3 Decryption
- Deep packet inspection
3. Which feature of the Sophos Firewall helps prevent a computer infected by a trojan from transmitting personal information
out of their network?
- Advanced Threat Protection (ATP)
4. Which feature of the Sophos Firewall identifies unknown application?
- Synchronized App Control
Chapter 2
5. What cloud platforms is Sophos Firewall supported on?
- AWS
- Azure
- Nutanix
6. How many radios do the wireless XGS series models have?
-1
7. The number of ports can be expanded using additional modules.
- True
8. You have received a new hardware Sophos Firewall. What is the default IP address and port that is used to access the device?
- 172.16.16.16:4444
9. You are preparing a Sophos firewall for installation on a remote site. The order for the license has not yet been processed.
Which device registration option do you select in the Initial Setup Wizard?
- I do not want to register now.
Chapter 3
10. In the example shown London Servers is a ….
- IP Host Group
11. Service objects can be created for which of the following?
- All of these (TCP/UDP Ports, IP Protocol Number, ICMP Type and Code)
12. In Which of these zones is an interface configured with a gateway?
- WAN
, 13. How many gateways can you include in an SD-WAN profile?
-8
14. Place the route types in the correct default order of precedence
- Static Highest precedence
- SD WAN
- VPN
- Default Lowest precedence
15. How many servers does Sophos Firewall support for static DNS?
-3
16. You have an existing DHCP server. What configuration allows Sophos Firewall to forward lease request to this?
- Relay
17. Which of these are defined as ‘Admin services’ in Device access?
- HTTPS
- SSH
18. You want a certificate to be signed by a third-party company. Which option should you choose?
- Generate CSR
19. What are the different types of traffic shaping policy you can create?
- Users
- web categories
- Rules
- Applications
20. What do you need to configure before you can start using traffic shaping?
- Total WAN bandwidth
Chapter 4
21. NAT rules are processed in order from top to bottom
- TRUE
22. Match the firewall icon to the description.
i- putih A disabled firewall rule
ii- muka A user firewall rule
iii- bag A web application firewall rule
iv- merah A firewall rule that will drop or reject traffic
23. All firewall rules are evaluated, and the best match is used.
- FALSE