QUESTIONS AND ANSWERS LATEST UPDATE
(ALREADY GRADED A+)
For which of these third party authentication methods must you specify a search base? (Select two.)
A. RADIUS
B. Active Directory
C. SecurID
D. LDAP
Active Directory
LDAP
You have a privately addressed email server behind your Firebox. If you want to make sure that all
traffic from this server to the Internet appears to come from the public IP address 203.0.113.25,
regardless of policies, which from of NAT would you use? (Select one.)
A. In the SMTP policy that handles traffic from the email server, select the option to apply dynamic
NAT to all traffic in the policy and set the source IP address 203.0.113.25.
B. Create a global dynamic NAT rule for traffic from the email server and set the source IP address to
203.0.113.25.
C. Create a static NAT action for traffic to the email server, and set the source IP address to
203.0.113.25.
Create a global dynamic NAT rule for traffic from the email server and set the source IP address to
203.0.113.25.
***Match each type of NAT with the correct description: Conserves IP addresses and hides the
internal topology of your network. (Choose one).
A. 1-to1 NAT
B. Dynamic NAT
C. NAT Loopback
Dynamic NAT
If your Firebox has a single public IP address, and you want to forward inbound traffic to internal hosts
based on the destination port, which type of NAT should you use? (Select one.)
A. Static NAT
B. 1-to-1 NAT
C. Dynamic NAT
Static NAT
, ***You need to create an HTTP-proxy policy to a specific domain for software updates (example.com).
The update site has multiple subdomains and dynamic IP addresses on a content delivery network.
Which of these options is the best way to define the destination in your HTTP-proxy policy? (Select
one.)
A. Configure a host name for update.example.com.
B. Configure an FQDN for *.example.com.
C. Add IP addresses that correspond to each software update server in the domain.
D. Create an alias for all subdomains and known IP addresses for example.com.
Configure an FQDN for *.example.com.
Prevent mail relay for the example.com domain.
From the SMTP proxy action settings in this image, which of these options is configured for incoming
SMTP traffic? (Select one.)
A. Rewrite the Mail From header for the example.com domain.
B. Deny incoming mail from the example.com domain.
C. Prevent mail relay for the example.com domain.
D. Deny outgoing mail from the example.com domain.
You can configure the SMTP-proxy policy to restrict email messages and email content based on which
of these message characteristics? (Select four.)
A. Sender Mail From address
B. Check URLs in message with WebBlocker
C. Email message size
D. Attachment file name and content type
E. Maximum email recipients
Sender Mail From address
Email message size
Attachment file name and content type
Maximum email recipients
An email newsletter about sales from an external company is sometimes blocked by spamBlocker.
What option could you choose to make sure the newsletter is delivered to your users? (Select one.)
A. Add a spamBlocker exception based on the From field of the newsletter email.
B. Set the spamBlocker action to quarantine the email for later retrieval.
C. Add a spamBlocker subject tag for bulk email messages.
D. Set the spamBlocker virus outbreak detection action to allow emails from the newsletter source.
Add a spamBlocker subject tag for bulk email messages.
***Your company denies downloads of executable files from all websites. What can you do to allow
users on the network to download executable files from the companys remote website? (Select one.)