Second Attemp
Second Attemp
Second Attemp
5
1. Select the correct definition of an exploit kit.
With the above options selected, which 2 of the following will be enabled in the default outbound firewall
rule once the Initial Setup wizard is complete?
2. When creating a site-to-site VPN between an XG Firewall and another vendor’s firewall, what is the
best protocol to use?
The answer can be found in Module 4: Site-to-Site Connections on slide 5.
3. You are in the process of deploying multiple RED devices. Due to bandwidth issues at the head
office, which 2 modes of deployment could be used to so that only necessary traffic is routed back to the
head office?
The answer can be found in Module 4: Site-to-Site Connections on slide 38.
8. Authentication v17.5
1. TRUE or FALSE: The Sophos Chromebook User ID app is deployed to Chromebooks from the XG
Firewall.
The answer can be found in Module 5: Authentication on slide 49.
2. Which 2 methods are supported for logoff detection when using STAS?
3. Which 2 of the following are TRUE about the hostname for user facing links?
2. What 3 options should be configured to ensure that the most secure scanning settings are in place to
protect users as they browse the web?
The answer can be found in Module 6: Web Protection and Application Control on slide 46.
3. You want to enable SafeSearch in a web protection policy on the XG Firewall, but some coworkers
are worried about the additional load this may put on the XG Firewall. What can you tell them to ease their
minds?
2. Your network has no existing VLANs and everything is connected using basic layer 2 switches. You
are configuring a secure wireless guest network that needs to have its traffic isolated. What security mode
would allow this to be done without any additional changes to the network configuration?
3. What 2 of the following are methods that can be used to allow access to a wireless hotspot on the
XG Firewall?
13. Remote Access v17.5
1. Where can an end user download the SSL VPN client from to install on their workstation?
2. Which 2 operating systems is the Sophos Connect IPsec client available for?
2. There are several important reports that need to be examined on a regular schedule from the XG
Firewall. You want to make these easily available when working with the WebAdmin interface. How can this
be accomplished?
3. Where would you view information on files being processed by Sandstorm for Web Protection?
2. A client is asking about the features that can be used on an XG firewall without a separate license.
Which 3 of the following features are included in the Sophos XG Firewall base license?
16. Labs v17.5
1. In Email Protection, where do you enable the SPX Reply Portal?
The answer can be found in lab task 7.3.
2. You have created an SSL VPN Remote Access policy for your Active Directory users, but you are
unable to authenticate successfully to establish a VPN connection. What do you need to do to resolve the
issue?
4. TRUE or FALSE: IPS policies can be applied to both User/Network rules and Business Application
rules.
6. TRUE or FALSE: Hotspots can only be created for wireless networks using the separate zone
access method.
The answer can be found in lab task 8.1.
7. The diagram below shows a company with two sites, one in London and in New York. Each site has
an Internet connection and is also connected via an MPLS.
You are configuring a static route on the London gateway to route traffic destined for the New York network
over the MPLS.
What IP address would need to go into the Gateway field to complete the static rule shown above?
8. You have configured one-time passwords. John Smith is trying to login to the User Portal; his
password is 'xgfirewall'. Below you can see the login screen and his token.
What does John Smith need to enter as the password to login?