Download Fireware Essentials Exam.Essentials.CertKey.2019-01-04.47q.vcex

Vendor: WatchGuard
Exam Code: Essentials
Exam Name: Fireware Essentials Exam
Date: Jan 04, 2019
File Size: 826 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
You configured four Device Administrator user accounts for your Firebox. To see a report of witch Device Management users have made changes to the device 
configuration, what must you do? (Select two.) 
  1. Start Firebox System Manager for the device and review the activity for the Management Users on the Authentication List tab.
  2. Connect to Report Manager or Dimension and view the Audit Trail report for your device.
  3. Open WatchGuard Server Center and review the configuration history for managed devices.
  4. Configure your device to send audit trail log messages to your WatchGuard Log Server or Dimension Log Server.
Correct answer: BC
Question 2
Which items are included in a Firebox backup image? (Select four.)
  1. Support snapshot
  2. Fireware OS
  3. Configuration file
  4. Log file
  5. Feature keys
  6. Certificates
Correct answer: BCEF
Explanation:
A Firebox backup image is a saved copy of the working image from the Firebox flash disk. The backup image includes the Firebox appliance software, configuration file, licenses, and certificates.  When you purchase an option for your Firebox, you add a new feature key to your configuration file. Reference: Fireware Basics, Courseware: WatchGuard System Manager 10, pages 14, 57
A Firebox backup image is a saved copy of the working image from the Firebox flash disk. The backup image includes the Firebox appliance software, configuration file, licenses, and certificates.  
When you purchase an option for your Firebox, you add a new feature key to your configuration file. 
Reference: Fireware Basics, Courseware: WatchGuard System Manager 10, pages 14, 57
Question 3
Only 50 clients on the trusted network of your Firebox can connect to the Internet at the same time. What could cause this? (Select one.)
  1. TheLiveSecurity feature key is expired.
  2. The device feature key allows a maximum of 50 client connections.
  3. The DHCP address pool on the trusted interface has only 50 IP addresses.
  4. The Outgoing policy allows a maximum of 50 client connections.
Correct answer: C
Question 4
The IP address for the trusted interface on your Firebox is 10.0.40.1/24, but you want to change the IP address for this interface. How can you avoid a network outage for clients on the trusted network when you change the interface IP address to 10.0.50.1/24? (Select one.)
  1. Create a 1-to-1 NAT rule for traffic from the 10.0.40.0/24 subnet to addresses on the 10.0.50.0/24 subnet.
  2. Add 10.0.40.1/24 as a secondary IP address for the interface.
  3. Add IP addresses on the 10.0.40.0/24 subnet to the DHCP Server IP address pool for this interface.
  4. Add a route to 10.0.40.0/24 with the gateway 10.0.50.1.
Correct answer: B
Question 5
In the network configuration in this image, which aliases is Eth2 a member of? (Select three.) 
  
  1. Any-optional
  2. Any-External
  3. Optional-1
  4. Any
  5. Any-Trusted
Correct answer: ACD
Explanation:
Question 6
Clients on the trusted network need to connect to a server behind a router on the optional network. Based on this image, what static route must be added to the 
Firebox for traffic from clients on the trusted network to reach a server at 10.0.20.100? (Select one.) 
  
  1. Route to 10.0.20.0/24, Gateway 10.0.2.1
  2. Route to 10.0.20.0/24, Gateway 10.0.2.254
  3. Route to 10.0.20.0, Gateway 10.0.2.254
  4. Route to 10.0.10.0/24, Gateway 10.0.10.1
Correct answer: B
Explanation:
We must add a trusted static route to the 10.0.20.0/24 network through the 10.0.2.254 gateway.
We must add a trusted static route to the 10.0.20.0/24 network through the 10.0.2.254 gateway.
Question 7
Which of these options are private IPv4 addresses you can assign to a trusted interface, as described in RFC 1918, Address Allocation for Private Internets? 
(Select three.)
  1. 192.168.50.1/24
  2. 10.50.1.1/16
  3. 198.51.100.1/24
  4. 172.16.0.1/16
  5. 192.0.2.1/24
Correct answer: ABD
Question 8
The policies in a default Firebox configuration do not allow outgoing traffic from optional interfaces.
  1. True
  2. False
Correct answer: B
Question 9
Which of these actions adds a host to the temporary or permanent blocked sites list? (Select three.)
  1. Enable the AUTO-block sites that attempt to connect option in a deny policy. 
  2. Add the site to the Blocked Sites Exceptions list.
  3. On the Firebox System Manager >Blocked Sites tab, select Add. 
  4. In Policy Manager, select Setup> Default Threat Protection > Blocked Sites and click Add.
Correct answer: ACD
Explanation:
A: You can configure a deny policy to automatically block sites that originate traffic that does not comply with the policy rulese1. From Policy Manager, double-click the PCAnywhere policy. 2. Click the Properties tab. Select the Auto-block sites that attempt to connect checkbox. Reference: https://www.watchguard.com/training/fireware/80/defense8.htmC: The blocked sites list shows all the sites currently blocked as a result of the rules defined in Policy Manager. From this tab, you can add sites to the temporaryblocked sites list, or remove temporary blocked sites. Reference: http://www.watchguard.com/training/fireware/82/monitoa6.htmD: You can use Policy Manager to permanently add sites to the Blocked Sites list.1. select Setup > Default Threat Protection > Blocked Sites. 2. Click Add.  The Add Site dialog box appears. Reference: http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#cshid=en-US/intrusionprevention/blocked_sites_permanent_c.html
A: You can configure a deny policy to automatically block sites that originate traffic that does not comply with the policy rulese
1. From Policy Manager, double-click the PCAnywhere policy. 
2. Click the Properties tab. Select the Auto-block sites that attempt to connect checkbox. 
Reference: https://www.watchguard.com/training/fireware/80/defense8.htm
C: The blocked sites list shows all the sites currently blocked as a result of the rules defined in Policy Manager. From this tab, you can add sites to the temporary
blocked sites list, or remove temporary blocked sites. 
Reference: http://www.watchguard.com/training/fireware/82/monitoa6.htm
D: You can use Policy Manager to permanently add sites to the Blocked Sites list.
1. select Setup > Default Threat Protection > Blocked Sites. 
2. Click Add.  
The Add Site dialog box appears. 
Reference: http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#cshid=en-US/intrusionprevention/blocked_sites_permanent_c.html
Question 10
Which of these threats can the Firebox prevent with the default packet handling settings? (Select four.)
  1. Access to inappropriate websites
  2. Denial of service attacks
  3. Flood attacks
  4. Malware in downloaded files
  5. Port scans 
  6. Viruses in email messages
  7. IP spoofing
Correct answer: BCEG
Explanation:
B: The default configuration of the XTM device is to block DDoS attacks.C: In a flood attack, attackers send a very high volume of traffic to a system so it cannot examine and allow permitted network traffic. For example, an ICMP flood attack occurs when a system receives too many ICMP ping commands and must use all of its resources to send reply commands. The XTM device can protect against these types of flood attacks: IPSec, IKE, ICMP. SYN, and UDP.E: When the Block Port Space Probes (port scans) and Block Address Space Probes check boxes are selected, all incoming traffic on all interfaces is examined by the XTM device. CG: Default packet handling can reject a packet that could be a security risk, including packets that could be part of a spoofing attack or SYN flood attackReference: http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#en-US/intrusionprevention/default_pkt_handling_opt_about_c.html%3FTocPath%3DDefault%2520Threat%2520Protection%7CAbout%2520Default%2520Packet%2520Handling%2520Options%7C_____0
B: The default configuration of the XTM device is to block DDoS attacks.
C: In a flood attack, attackers send a very high volume of traffic to a system so it cannot examine and allow permitted network traffic. For example, an ICMP flood attack occurs when a system receives too many ICMP ping commands and must use all of its resources to send reply commands. The XTM device can protect against these types of flood attacks: IPSec, IKE, ICMP. SYN, and UDP.
E: When the Block Port Space Probes (port scans) and Block Address Space Probes check boxes are selected, all incoming traffic on all interfaces is examined by the XTM device. 
CG: Default packet handling can reject a packet that could be a security risk, including packets that could be part of a spoofing attack or SYN flood attack
Reference: http://www.watchguard.com/help/docs/wsm/xtm_11/en-US/index.html#en-US/intrusionprevention/default_pkt_handling_opt_about_c.html%3FTocPath%
3DDefault%2520Threat%2520Protection%7CAbout%2520Default%2520Packet%2520Handling%2520Options%7C_____0
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!