100% found this document useful (1 vote)
5K views3 pages

Sophos

This document contains 40 multiple choice questions about configuring and using a Sophos firewall. It addresses topics like creating different types of users, VPN protocols, wireless security modes, authentication methods, and features relating to application control, web filtering, logging, reporting and more.

Uploaded by

cesar hoyos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
5K views3 pages

Sophos

This document contains 40 multiple choice questions about configuring and using a Sophos firewall. It addresses topics like creating different types of users, VPN protocols, wireless security modes, authentication methods, and features relating to application control, web filtering, logging, reporting and more.

Uploaded by

cesar hoyos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question 1

You need to create a user account to authenticate a VoIP system that needs access
to the Internet. The system does not have the ability to authenticate with your
directory service. What type of user would you create to accomplish this? ->
Clientless User

Question 3
Which 3 of the following forms of access can be secured using one-time passwords?

Question 4
Which interface type allows standard routing to be used to send traffic over the
VPN? -> Tunnel

Question 5
TRUE or FALSE: Sophos Firewall is supported on any public cloud. -> FALSE

Question 6
Which Sophos Firewall feature allows you to route email via an alternate set of
servers rather than directly to a recipient's server? -> Smarthosts

Question 9
Which deployment mode can protect web servers from common attacks? => Web
Application Firewall (WAF)

Question 10
TRUE or FALSE: Web protection exceptions apply to all web protection policies no
matter when they are applied in the Sophos Firewall. => True

Question 11
Which feature of the Sophos Firewall identifies unknown applications? =>
Synchronized App Control

Question 12
TRUE or FALSE: The firewall rule ID is the same as the rule position. => FALSE

Question 13
Which of the following DoS and spoof protection modes will drop packets if the IP
and MAC do not match with any entry in the IP-MAC trusted list? => IP-MAC

Question 15
You have created an SSL VPN Remote Access policy for your Active Directory users,
but you are unable to authenticate successfully to establish a VPN connection. What
do you need to do to resolve the issue? => Select the Active Directory server as an
authentication source in SSL VPN Authentication Methods

Question 16
Web policy rules apply to which 2 of the following? Users, Groups

Question 17
TRUE or FALSE: The Sophos Firewall's lite implementation of Cloud Access Security
Broker blocks all cloud applications by default. => FALSE

Question 18
What is the Clientless Access Portal used for? => To provide access to internal
resources without the need for a VPN client to be installed

This study source was downloaded by 100000841328257 from CourseHero.com on 06-10-2022 21:36:26 GMT -05:00

https://www.coursehero.com/file/108042710/Sophostxt/
Question 19
Which form of single sign-on (SSO) informs the Sophos Firewall when a user
authenticates with a domain controller? = STAS

Question 21
Which wireless security mode must be used to support Fast BSS? => WPA2

Question 22
Which 2 of the following can users allow and block in the User Portal?

Question 23
Which is the control port used in RED connections? => 3400

Question 24
Which of the following statements about zero-touch deployment are TRUE? => Zero-
touch configuration rules can only be created for unregistered hardware serial
numbers

Question 25
During troubleshooting you do not see as much information in the log files as you
were expecting. What setting needs to be changed to see all the traffic passing
through a firewall rule? => Log firewall traffic

Question 26
If you are using the Sophos Firewall as an explicit proxy, which web filtering
option will be used? => Legacy Web Proxy

Question 27
You have created a report that displays data that you wish to check on a daily
basis. How can you make this data easily available in the WebAdmin interface? =>
Create a bookmark for the report

Question 29
When creating a site-to-site VPN between a Sophos Firewall and another vendor’s
firewall, what is the best protocol to use? => IPsec

Question 30
Which VPN protocols are supported by the Sophos Connect client? => IPsec, SSL

Question 31
Which page lists all current applications that are connecting through the Sophos
Firewall? => Live connections

Question 32
Which 2 of the following are methods of Sophos Firewall authentication? => Captive
Portal, Authentication Agent

Question 33
Type the name of the only zone that cannot have a physical port or interface
assigned to it.=> VPN

Question 34
What type of user can be created to allow temporary access to resources with the
least amount of effort? => Guest User

This study source was downloaded by 100000841328257 from CourseHero.com on 06-10-2022 21:36:26 GMT -05:00

https://www.coursehero.com/file/108042710/Sophostxt/
Question 35
You have received a new hardware Sophos Firewall and are preparing to connect to it
for the first time. What is the default IP address and port that is used to access
the device? HTTPS://172.16.16.16:4444

Question 36
Which firewall icon shown represents a network rule that will drop or reject
traffic? G

Question 37
How much storage is included with each Central Firewall Reporting Advanced license
in GB? Enter the answer as numerical digits only. => 100

Question 38
You are checking the application risk meter which is reporting a risk score of 4.2.
Which of the following statements are true in this circumstance? => There are users
performing risky actions on the network

Question 39
You have configured destination-based Security Heartbeat in the firewall rule
shown here.
Which zone does not support the Security Heartbeat? => WAN

Question 40
Users complain that when working long hours, they often lose access to Internet
resources.
Looking at the configuration of the rule above, what is causing this? => A schedule
is applied to the rule

This study source was downloaded by 100000841328257 from CourseHero.com on 06-10-2022 21:36:26 GMT -05:00

https://www.coursehero.com/file/108042710/Sophostxt/
Powered by TCPDF (www.tcpdf.org)

You might also like