What should the System Administrator do to resolve this issue?

One XGS appliance in a financial company was running firmware version 5.2 for 2 years. The System Administrator upgraded the firmware to 5.3.2.3 becauseversion 5.2 is no longer supported and enabled Any-Any-Any-Inspect rule in Outbound SSL Inspection Policy according to new company audit policy. After that,several users complain that their workstations cannot get Windows Update […]

Read More

How can the SSL decryption errors for each web site be detected?

The System Administrator has configured Outbound SSL Inspection Policy for five SSL-enabled web sites. How can the SSL decryption errors for each web site be detected? A. By looking at System Events Logs B. By first enabling Alert on Failure C. By looking at Network Access Events Logs D. By looking at the SSL Connection […]

Read More

Obtain an Inspection license for the XGS Obtain a certificate from a public CA and upload it to the

A System Administrator is planning to implement SSL Inspection for both outbound user traffic and inbound traffic to a company web server. The requirements are as follows: SSL Inspection should protect users from connections to fraudulent serversOutbound SSL Inspection should be limited to select web site categoriesAvoid having to deploy files, configurations, or certificates to […]

Read More

How can these suspicious packets be effectively blocked from the network?

A System Administrator sees a lot of Ping_Sweep events reported as blocked on the network. However, because the Ping_Sweep signature only blocks the pingpacket that triggers the event, most of the ping packets are allowed through the XGS. How can these suspicious packets be effectively blocked from the network? A. Add a quarantine response to […]

Read More

Which two methods can be used to accomplish this?

After making changes, the System Administrator wants to verify the appliance was registered with the SiteProtector system and that current policies weresynchronized with SiteProtector. Which two methods can be used to accomplish this? (Choose two.) A. In the SiteProtector console, select Asset view and check health status. B. In the SiteProtector console, check the health […]

Read More

What should be the settings for built-in Hardware Bypass and Unanalyzed Policy?

Security Policies of an organization demand that no network traffic should be allowed by XGS without inspection in case of XGS power failure or traffic beyond XGScapabilities. What should be the settings for built-in Hardware Bypass and Unanalyzed Policy? A. Hardware Bypass Mode= Fail Open; Unanalyzed Policy= Drop B. Hardware Bypass Mode= Fail Open; Unanalyzed […]

Read More

Which three parameters are required to create this Schedule Object?

The System Administrator of a financial company wants to control the network traffic during office hours, for example, social networking or streaming media trafficare forbidden during business hours (08:00-19:00) but are permitted after 19:00 from Monday to Friday. The consultant from an IBM business partner suggestedthat the Schedule Object in Network Access Policy could be […]

Read More