156-915.80 Exam Question 91

You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since the log files are also needed. What action do you need to take regarding timeout?
  • 156-915.80 Exam Question 92

    Which of the following tools is used to generate a Security Gateway R80 configuration report?
  • 156-915.80 Exam Question 93

    You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?
  • 156-915.80 Exam Question 94

    Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query.
    However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R80 Firewall Rule Base.
    To make this scenario work, the IT administrator must:
    1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
    2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
    3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
    Ms. McHanry tries to access the resource but is unable. What should she do?
  • 156-915.80 Exam Question 95

    In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.

    What happens when Eric tries to connect to a server on the Internet?