Which of the following is considered to be the more secure and preferred VPN authentication method?
Correct Answer:
B
References:
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Correct Answer:
C
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
Correct Answer:
B
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Correct Answer:
D
What are the three deployment considerations for a secure network?
Correct Answer:
A