

















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Watch guard Network Security Essentials Exam Latest Version 2025-2026| Questions and Accurate Answers | Verified Solution 100%
Typology: Exams
1 / 25
This page cannot be seen from the preview
Don't miss anything!
Allow Incoming connections to the example.com domain only .From the SMTP proxy action settings in this image, which of these options is configured for incoming SMTP traffic? (Select one.) Allow Incoming connections to the example.com domain only Allow Outgoing connection from example.com Deny Incoming connections to the example.com domain only Deny outgoing connections from example.com Any-optional Optional- 1 Any ***In the network configuration in this image, which aliases is Eth2 a member of? (Select three.) A. Any-optional B. Any-External C. Optional- 1 D. Any E. Any-Trusted ***When your device is in a default state, to which interface do you connect your management computer so you can use the Quick Setup Wizard or Web SetupWizard to configure the device? (Select one.) A. Interface 0 B. Console interface
C. Any interface D. Interface 1 Interface 1 ***In the default Firebox configuration file, which policies control management access to the device? (Select two.) A. WatchGuard B. FTP C. Ping D. WatchGuard Web UI E. Outgoing WatchGuard WatchGuard Web UI To use the Web Setup Wizard or Quick Setup Wizard to configure your Firebox or XTM device, your computer must have an IP address on which subnet? (Select one.) A. 10.0.10.0/ B. 10.0.1.0/ C. 172.16.10.0/ D. 192.168.1.0/ 10.0.1.0/ ***What is the best method to downgrade the version of Fireware OS on your Firebox without losing all device configuration settings? (Select one.) A. Restore a saved backup image that was created for the device before the last Fireware OS upgrade. B. Use the Upgrade OS feature in Fireware Web UI to install the sysa_dl file for an order version of Fireware OS.
Passwords Feature key ***Only 50 clients on the trusted network of your Firebox can connect to the Internet at the same time. What could cause this? (Select one.) A. The Live Security feature key is expired. B. The device feature key allows a maximum of 50 client connections. C. The DHCP address pool on the trusted interface has only 50 IP addresses. D. The Outgoing policy allows a maximum of 50 client connections. The DHCP address pool on the trusted interface has only 50 IP addresses. Route to 10.0.20.0/24, Gateway 10.0.2. Clients on the trusted network need to connect to a server behind a router on the optional network. Based on this image, what static route must be added to the Firebox for traffic from clients on the trusted network to reach a server at 10.0.20.100? (Select one.) A. Route to 10.0.20.0/24, Gateway 10.0.2. B. Route to 10.0.20.0/24, Gateway 10.0.2. C. Route to 10.0.20.0, Gateway 10.0.2. D. Route to 10.0.10.0/24, Gateway 10.0.10. ***The IP address for the trusted interface on your Firebox is 10.0.40.1/24, but you want to change the IP address for this interface. How can you avoid a network outage for clients on the trusted network when you change the interface IP address to 10.0.50.1/24? (Select one.) A. Create a 1-to-1 NAT rule for traffic from the 10.0.40.0/24 subnet to addresses on the 10.0.50.0/ subnet. B. Add 10.0.40.1/24 as a secondary IP address for the interface. C. Add IP addresses on the 10.0.40.0/24 subnet to the DHCP Server IP address pool for this interface. D. Add a route to 10.0.40.0/24 with the gateway 10.0.50.1.
Add 10.0.40.1/24 as a secondary IP address for the interface. ***Which of these options are private IPv4 addresses you can assign to a trusted interface, as described in RFC 1918, Address Allocation for Private Internets?(Select three.) A. 192.168.50.1/ B. 10.50.1.1/ C. 198.51.100.1/ D. 172.16.0.1/ E. 192.0.2.1/ 192.168.50.1/ 10.50.1.1/ 172.16.0.1/ The policies in a default Firebox configuration do not allow outgoing traffic from optional interfaces. False True false When you examine the log messages In Traffic Monitor, you see that some network packets are denied with an unhandled packet log message. What does this log massage mean? (Select one.) A. The packet is denied because the site is on the Blocked Sites List. B. The packet is denied because it matched a policy. C. The packet is denied because it matched an IPS signature. D. The packet is denied because it does not match any firewall policies. The packet is denied because it does not match any firewall policies.
C. FTP port 21 D. HTTPS port 443 E. DNS port 53 HTTP port 80 HTTPS port 443 DNS port 53 The default Outgoing policy has been removed and there is no policy to allow DNS traffic. ***Users on the trusted network cannot browse Internet websites. Based on the configuration shown in this image, what could be the problem with this policy configuration? (Select one.) A. The default Outgoing policy has been removed and there is no policy to allow DNS traffic. B. The HTTP-proxy policy has higher precedence than the HTTPS-proxy policy. C. The HTTP-proxy policy is configured for the wrong port. D. The HTTP-proxy allows Any-Trusted and Any-Optional to Any-External. How is a proxy policy different from a packet filter policy? (Select two.) A. Only a proxy policy examines information in the IP header. B. Only a proxy policy uses the IP source, destination, and port to control network traffic. C. Only a proxy policy can prevent specific threats without blocking the entire connection. D. Only a proxy works at the application, network, and transport layers to examine all connection data. Only a proxy policy can prevent specific threats without blocking the entire connection. Only a proxy works at the application, network, and transport layers to examine all connection data.
Which authentication servers can you use with your Firebox? (Select four.) A. Active Directory B. RADIUS C. LDAP D. Linux Authentication E. Kerberos F. TACACS+ G. Firebox databases Active Directory RADIUS LDAP Firebox databases New info from book 2021: Active Directory RADIUS LDAP And SecurID ***When your users connect to the Authentication Portal page to authenticate, they see a security warning message in their browses, which they must accept before they can authenticate. How can you make sure they do not see this security warning message in their browsers? (Select one.) A. Import a custom self-signed certificate or a third-party certificate to your Firebox and import the same certificate to all client computers or web browsers. B. Replace the Firebox certificate with the trusted certificate from your web server. C. Add the user accounts for your users who use the Authentication Portal to a list of trusted users on your Firebox. D. Instruct them to disable security warning message in their preferred browsers. Import a custom self-signed certificate or a third-party certificate to your Firebox and import the same certificate to all client computers or web browsers.
***You need to create an HTTP-proxy policy to a specific domain for software updates (example.com). The update site has multiple subdomains and dynamic IP addresses on a content delivery network. Which of these options is the best way to define the destination in your HTTP-proxy policy? (Select one.) A. Configure a host name for update.example.com. B. Configure an FQDN for *.example.com. C. Add IP addresses that correspond to each software update server in the domain. D. Create an alias for all subdomains and known IP addresses for example.com. Configure an FQDN for *.example.com. Prevent mail relay for the example.com domain. From the SMTP proxy action settings in this image, which of these options is configured for incoming SMTP traffic? (Select one.) A. Rewrite the Mail From header for the example.com domain. B. Deny incoming mail from the example.com domain. C. Prevent mail relay for the example.com domain. D. Deny outgoing mail from the example.com domain. You can configure the SMTP-proxy policy to restrict email messages and email content based on which of these message characteristics? (Select four.) A. Sender Mail From address B. Check URLs in message with WebBlocker C. Email message size D. Attachment file name and content type E. Maximum email recipients Sender Mail From address Email message size Attachment file name and content type Maximum email recipients An email newsletter about sales from an external company is sometimes blocked by spamBlocker. What option could you choose to make sure the newsletter is delivered to your users? (Select one.) A. Add a spamBlocker exception based on the From field of the newsletter email. B. Set the spamBlocker action to quarantine the email for later retrieval. C. Add a spamBlocker subject tag for bulk email messages. D. Set the spamBlocker virus outbreak detection action to allow emails from the newsletter source. Add a spamBlocker subject tag for bulk email messages. ***Your company denies downloads of executable files from all websites. What can you do to allow users on the network to download executable files from the companys remote website? (Select one.)
A. Add an HTTP proxy exception for the company's remote website. B. Create a WebBlocker exception to allow access to the company's remote website. C. Create an IPS exception. D. Create a Blocked Sites exception. E. Configure HTTP Request > URL Paths to allow the company's remote website. Add an HTTP proxy exception for the company's remote website. A user receives a deny message that the installation file (install.exe) is blocked by the HTTP-proxy policy and cannot be downloaded. Which HTTP proxy action rule must you modify to allow download of the installation file? (Select one.) A. HTTP Request > Request Methods B. HTTP Response > Body Content Types C. HTTP Response > Header Fields D. WebBlocker E. HTTP Request > Authorization HTTP Response > Body Content Types Which takes precedence: WebBlocker category match or a WebBlocker exception? A. WebBlocker exception B. WebBlocker category match WebBlocker exception ***To prevent certificate error warnings in your browser when you use deep content inspection with the HTTPS proxy, you can export the proxy authority certificate from the Firebox and import that certificate to all client devices. A. True B. False True ***Which of these options must you configure in an HTTPS-proxy policy to detect credit card numbers in HTTP traffic that is encrypted with SSL? (Select two.) A. WebBlocker B. Gateway AntiVirus C. Application Control D. Content Inspection E. Data Loss Prevention Content inspection Data Loss Prevention
A. Enable default packet handling. B. Configure reputation Enabled Defense. C. Enable automatic signature updates. D. Enable HTTPS deep inspection. Enable automatic signature updates. Which policies can use the Intrusion Prevention Service to block network attacks? (Select one?) A. Only HTTP and HTTPS Proxy policies B. Only proxy policies C. All policies D. Only packet filter policies E. Only inbound policies All policies Which of these services would you use to allow the use of P2P programs for a specific department in your organization? (Select one.) A. Reputation Enabled Defense B. Application Control C. Data Loss Prevention D. IPS Application Control You can use Firebox System Manager to download a PCAP file that includes packet information about the protocols that manage traffic on your network. A. True B. False True ***From the Firebox System Manager >Authentication List tab, you can view all of the authenticated users connected to your Firebox and disconnect any of them. A. True B. False true Match the monitoring tool to the correct task.Which is not a Fireware monitoring tool? (Select one) A. FireBox System Manager - Blocked Sites list B. Log Server C. FireWatch D. Firebox System Manager - Subscription services
E. Firebox System Manager - Authentication list F. Traffic Monitor Log Server Which diagnostic tasks can you run from the Traffic Monitor tab of Firebox System Manager? (Select four.) A. DNS lookup B. MAC address lookup C. Traceroute D. Reputation lookup E. Ping F. TCP dump DNS lookup Traceroute Ping TCP dump How can you include log messages from more than one Firebox in a single report generated by Dimension? (Select two.) A. You cannot see report data in Dimension for more than one device. B. Create a device group and view the reports for that group. C. Create a report schedule that includes all the devices you want to include in the report. D. Export report data as a single PDF file for all the devices you want to include in the report. Create a device group and view the reports for that group. Create a report schedule that includes all the devices you want to include in the report. To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.) A. You can only send log messages to Dimension from a computer that is on the network behind your gateway Firebox. B. You must change the connection settings in Dimension, not on the gateway Firebox. C. You must add a policy to the remote device configuration file to allow traffic to a Dimension. D. You must make sure that either the WG-Logging packet filter policy, or another policy that allows external connections to Dimension over port 4115, is included You must add a policy to the remote device configuration file to allow traffic to a Dimension. Which WatchGuard tools can you use to review the log messages generated by your Firebox? (Select three). A. Firebox System Manager > Traffic Monitor
In this diagram, which branch office VPN tunnel route must you add on the Site B Firebox to allow traffic between devices on the trusted network at Site B and the trusted network at site A? (Select one.) A. Local: 192.168.1.0/24 <--> Remote: 10.0.10.0/ B. Local: 203.0.113.10/24 <--> Remote: 198.151.100.2/ C. Local: 10.0.10.1/24 <--> Remote: 192.168.1.1/ D. Local: 10.0.10.0/24 <--> Remote: 192.168.1.0/ 10.0.10.0/ A local branch office VPN tunnel route is configured as shown in this image. On the remote peer device, what must be configured as the remote network address for this tunnel route? (Select one.) A. 10.0.1.0/ B. 10.0.10.0/ C. 10.0.20.0/ false ***With the policies configured as shown in this image, HTTP traffic can be sent and received through branch office VPN tunnel.1 and tunnel.2. A. True B. False ***While troubleshooting a branch office VPN tunnel, you see this log message:2014- 07 - 23 12:29: iked (203.0.113.10<->203.0.113.20) Peer proposes phase one encryption 3 DES, expecting AES What settings could you modify in the local device configuration to resolve this issue? (Select one.) A. BOVPN Gateway settings B. BOVPN-Allow policies C. BOVPN Tunnel settings D. BOVPN Tunnel Route settings Hide Solution Discussion 1 BOVPN Gateway settings If you use an external authentication server for mobile VPN, which option must you complete before remote users can authenticate? (Select one.) A. Create aliases for each remote user's virtual IP address. B. Reboot the authentication server. C. Add the Mobile VPN user group and remote users to your authentication server. D. Add the remote users to a Mobile VPN user group on your Firebox. Add the Mobile VPN user group and remote users to your authentication server.
In a Mobile VPN configuration, why would you choose default route VPN over split tunnel VPN? (Select one.) A. Default route VPN allows your Firebox to examine all remote user traffic B. Default route VPN uses less bandwidth C. Default route VPN uses less processing power D. Default route VPN automatically allows dynamic NAT Default route VPN allows your Firebox to examine all remote user traffic You can use Firebox-DB authentication with any type of Mobile VPN. A. True B. False True Which tool is used to see a treemap visualization of the traffic through your Firebox? (Select one) A. FireBox System Manager - Blocked Sites list B. Log Server C. Service Watch D. Firebox System Manager - Subscription services E. Firebox System Manager - Authentication list F. Traffic Monitor Service Watch Which tool can add an IP address for the Firebox to permanently block? (Select one) A. FireBox System Manager - Blocked Sites list B. Log Server C. Service Watch D. Firebox System Manager - Subscription services E. Firebox System Manager - Authentication list F. Traffic Monitor FireBox System Manager - Blocked Sites list Match the monitoring tool to the correct task.Which tool can ping the source of a denied packet? (Select one) A. FireBox System Manager - Blocked Sites list B. Log Server C. Service Watch D. Firebox System Manager - Subscription services E. Firebox System Manager - Authentication list F. Traffic Monitor
Match each WatchGuard Subscription Service with its function.Cloud based service that controls access to website based on a sites previous behavior. (Choose one). A. Reputation Enable Defense RED B. Data Loss Prevention DLP C. WebBlocker D. Intrusion Prevention Server IPS E. Application Control F. Quarantine Server Reputation Enable Defense RED Match each WatchGuard Subscription Service with its function.Scans files to detect malicious software infections. (Choose one). A. Reputation Enable Defense RED B. Gateway / Antivirus C. Data Loss Prevention DLP D. Spam Blocker E. Quarantine Server Gateway / Antivirus Match each WatchGuard Subscription Service with its function.Prevents accidental or unauthorized transmission of confidential information outside your network. (Choose one). A. Reputation Enable Defense RED B. Gateway / Antivirus C. Data Loss Prevention DLP D. Intrusion Prevention Server IPS E. APT Blocker Data Loss Prevention DLP Match each WatchGuard Subscription Service with its function.Uses signatures to provide real-time protection against network attacks. (Choose one). A. Reputation Enable Defense RED B. Data Loss Prevention DLP C. Intrusion Prevention Server IPS D. Application Control E. APT Blocker Intrusion Prevention Server IPS Match each WatchGuard Subscription Service with its function. Uses rules, pattern matching, and sender reputation to block unwanted email messages. (Choose one).
A. Reputation Enable Defense RED B. Gateway / Antivirus C. Spam Blocker D. Intrusion Prevention Server IPS E. APT Blocker Spam Blocker Match each WatchGuard Subscription Service with its function. Controls access to website based on content categories.. (Choose one). A. Reputation Enable Defense RED B. Gateway / Antivirus C. WebBlocker D. Intrusion Prevention Server IPS E. Application Control WebBlocker ***Match each type of NAT with the correct description:Allows a user on the trusted or optional network to connect to a public server that is on the same physical Firebox interface by its public IP address or domain name. (Choose one) A. 1-to1 NAT B. Dynamic NAT C. NAT Loopback NAT Loopback ***Match each type of NAT with the correct description:Changes and routes all incoming and outgoing packets sent from one range of addresses to a different range of addresses. (Choose one) A. 1-to1 NAT B. Dynamic NAT C. NAT Loopback 1 - to1 NAT *** True of false: a packet filter analyzes traffic at the application, transport, network layers? false ***Your company denies downloads of PDF files from all websites. What can you do to allow users on the network to download PDF files from the companys remote website? (Select one.) A. Add an HTTP proxy exception for the company's remote website. B. Create a WebBlocker exception to allow access to the company's remote website. C. Create an IPS exception.