Fireware-Essentials Dumps Fireware-Essentials Braindumps Fireware-Essentials Real Questions Fireware-Essentials Practice Test Fireware-Essentials Actual Questions Watchguard Fireware-Essentials Fireware Essentials https://killexams.com/pass4sure/exam-detail/Fireware-Essentials Question: 103 You configured four Device Administrator user accounts for your Firebox. To see a report of witch Device Management users have made changes to the device configuration, what must you do? (Select two.) A. Start Firebox System Manager for the device and review the activity for the Management Users on the Authentication List tab. B. Connect to Report Manager or Dimension and view the Audit Trail report for your device. C. Open WatchGuard Server Center and review the configuration history for managed devices. D. Configure your device to send audit trail log messages to your WatchGuard Log Server or Dimension Log Server. Answer: B,C Question: 104 Which takes precedence: WebBlocker category match or a WebBlocker exception? A. WebBlocker exception B. WebBlocker category match Answer: B Question: 105 From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them. A. True B. False Answer: B Question: 106 Users on the trusted network cannot browse Internet websites. Based on the configuration shown in this image, what could be the problem with this policy configuration? (Select one.) A. The default Outgoing policy has been removed and there is no policy to allow DNS traffic. B. The HTTP-proxy policy has higher precedence than the HTTPS-proxy policy. C. The HTTP-proxy policy is configured for the wrong port. D. The HTTP-proxy allows Any-Trusted and Any-Optional to Any-External. Answer: C Question: 107 HOTSPOT Match each WatchGuard Subscription Service with its function: wrong Answer: C Explanation: WebBlocker Spam Blocker Gateway / Antivirus APT Blocker Application Control Quarantee Server Intrusion Prevention Server IPS Data Loss Prvention DLP Reputation Enable Defense RED Question: 108 Which of these threats can the Firebox prevent with the default packet handling settings? (Select four.) A. Access to inappropriate websites B. Denial of service attacks C. Flood attacks D. Malware in downloaded files E. Port scans F. Viruses in email messages G. IP spoofing Answer: B,C,E,G Question: 109 In the network configuration in this image, which aliases is Eth2 a member of? (Select three.) A. Any-optional B. Any-External C. Optional-1 D. Any E. Any-Trusted Answer: A,C,D Question: 110 To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.) A. You can only send log messages to Dimension from a computer that is on the network behind your gateway Firebox. B. You must change the connection settings in Dimension, not on the gateway Firebox. C. You must add a policy to the remote device configuration file to allow traffic to a Dimension. D. You must make sure that either the WG-Logging packet filter policy, or another policy that allows external connections to Dimension over port 4115, is included in the configuration file. Answer: C Question: 111 An email newsletter about sales from an external company is sometimes blocked by spamBlocker. What option could you choose to make sure the newsletter is delivered to your users? (Select one.) A. Add a spamBlocker exception based on the From field of the newsletter email. B. Set the spamBlocker action to quarantine the email for later retrieval. C. Add a spamBlocker subject tag for bulk email messages. D. Set the spamBlocker virus outbreak detection action to allow emails from the newsletter source. Answer: C Question: 112 You can use Firebox-DB authentication with any type of Mobile VPN. A. True B. False Answer: B Question: 113 You can configure your Firebox to automatically redirect users to the Authentication Portal page. A. True B. False Answer: B Question: 114 Your company denies downloads of executable files from all websites. What can you do to allow users on the network to download executable files from the companyâs remote website? (Select one.) A. Add an HTTP proxy exception for the companyâs remote website. B. Create a WebBlocker exception to allow access to the companyâs remote website. C. Create an IPS exception. D. Create a Blocked Sites exception. E. Configure HTTP Request > URL Paths to allow the companyâs remote website. Answer: A Question: 115 You have a privately addressed email server behind your Firebox. If you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use? (Select one.) A. In the SMTP policy that handles traffic from the email server, select the option to apply dynamic NAT to all traffic in the policy and set the source IP address 203.0.113.25. B. Create a global dynamic NAT rule for traffic from the email server and set the source IP address to 203.0.113.25. C. Create a static NAT action for traffic to the email server, and set the source IP address to 203.0.113.25. Answer: B Question: 116 While troubleshooting a branch office VPN tunnel, you see this log message: 2014-07-23 12:29:15 iked (203.0.113.10<->203.0.113.20) Peer proposes phase one encryption 3DES, expecting AES What settings could you modify in the local device configuration to resolve this issue? (Select one.) A. BOVPN Gateway settings B. BOVPN-Allow policies C. BOVPN Tunnel settings D. BOVPN Tunnel Route settings Answer: A,B Explanation: The WatchGuard BOVPN settings error in this example states phase one encryption. Only the BOVPN Gateway settings can specify phase one settings. BOVPN Tunnel settings specify phase 2 settings. Question: 117 Which WatchGuard tools can you use to review the log messages generated by your Firebox? (Select three). A. Firebox System Manager > Traffic Monitor B. Fireware XTM Web UI > Traffic Monitor C. Firebox System Manager > Status Report D. Dimension > Log manager E. WatchGuard System Manager > Policy Manager Answer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