The IP address for the trusted interface on your Firebox is 10.0.40.1/24, but you want to change the IP address for this interface. How can you avoid a network outage for clients on the trusted network when you change the interface IP address to 10.0.50.1/24? (Select one.)
A. Create a 1-to-1 NAT rule for traffic from the 10.0.40.0/24 subnet to addresses on the 10.0.50.0/24 subnet.
B. Add 10.0.40.1/24 as a secondary IP address for the interface.
C. Add IP addresses on the 10.0.40.0/24 subnet to the DHCP Server IP address pool for this interface.
D. Add a route to 10.0.40.0/24 with the gateway 10.0.50.1.
Which of these actions adds a host to the temporary or permanent blocked sites list? (Select three.)
A. Enable the AUTO-block sites that attempt to connect option in a deny policy.
B. Add the site to the Blocked Sites Exceptions list.
C. On the Firebox System Manager >Blocked Sites tab, select Add.
D. In Policy Manager, select Setup> Default Threat Protection > Blocked Sites and click Add.
If you disable the Outgoing policy, which policies must you add to allow trusted users to connect to commonly used websites? (Select three.)
A. HTTP port 80
B. NAT policy
C. FTP port 21
D. HTTPS port 443
E. DNS port 53
When your users connect to the Authentication Portal page to authenticate, they see a security warning message in their browses, which they must accept before they can authenticate. How can you make sure they do not see this security warning message in their browsers? (Select one.)
A. Import a custom self-signed certificate or a third-party certificate to your Firebox and import the same certificate to all client computers or web browsers.
B. Replace the Firebox certificate with the trusted certificate from your web server.
C. Add the user accounts for your users who use the Authentication Portal to a list of trusted users on your Firebox.
D. Instruct them to disable security warning message in their preferred browsers.
For which of these third party authentication methods must you specify a search base? (Select two.)
A. RADIUS
B. Active Directory
C. SecurID
D. LDAP
Which of these services would you use to allow the use of P2P programs for a specific department in your organization? (Select one.)
A. Reputation Enabled Defense
B. Application Control
C. Data Loss Prevention
D. IPS
You can use Firebox-DB authentication with any type of Mobile VPN.
A. True
B. False
Which tool can add an IP address for the Firebox to permanently block? (Select one)
A. FireBox System Manager – Blocked Sites list
B. Log Server
C. FireWatch
D. Firebox System Manager – Subscription services
E. Firebox System Manager – Authentication list
F. Traffic Monitor
Match each WatchGuard Subscription Service with its function.
Scans files to detect malicious software infections. (Choose one).
A. Reputation Enable Defense RED
B. Gateway / Antivirus
C. Data Loss Prevention DLP
D. Spam Blocker
E. Quarantine Server