1. Overview and Deployment v19.
0
1. TRUE or FALSE. Sophos Firewall is supported on any public cloud.
2. Which 3 of the following cloud platforms is Sophos Firewall supported on?
This answer can be found in the Sophos Firewall Deployment Options and Common Scenarios
chapter.
3. Lateral movement protection is made possible by which of the following?
This answer can be found in the What is Sophos Firewall chapter.
2. Getting Started v19.0
1. Which 2 of the following are defined as ‘Admin services’ in Device access?
2. Service objects can be created for which of the following?
3. What do you need to configure before you can start using traffic shaping?
This answer can be found in the Getting started with Traffic Shaping on Sophos Firewall chapter.
3. Interfaces and Zones v19.0
1. Which zone is used for external interfaces that provide Internet access?
This answer can be found in the Getting Started with Zones and Interfaces on Sophos Firewall
chapter.
4. Firewall v19.0
1. Which 3 of the following are the default decryption profiles available in Sophos Firewall?
This answer can be found in the Configuring TLS Decryption on Sophos Firewall chapter.
2. Where would you exclude a website from TLS inspection?
This answer can be found in the Configuring TLS Decryption on Sophos Firewall chapter.
3. When creating a NAT rule which option allows you to select different source NATs based on
the outbound interface within a single rule?
4. TRUE or FALSE. The option to create loopback and reflexive NAT rules is only available
when adding a NEW NAT rule, not when editing an existing NAT rule.
5. Firewall Icons v19.0
1. Which firewall icon shown represents a disabled user rule?
This study source was downloaded by 100000887076760 from CourseHero.com on 07-16-2024 07:22:24 GMT -05:00
https://www.coursehero.com/file/181624581/sophos-et80-engineer-v19docx/
6. Network Protection v19.0
1. Which of the following drops traffic that is maliciously trying to prevent legitimate traffic from
being able to access services?
This answer can be found in the Getting Started with Intrusion Prevention on Sophos Firewall
chapter.
2. Which of the following drops traffic that is trying to pretend to come from a different MAC or IP
address to bypass protection?
3. Which of the following protects against exploits and malformed traffic?
This answer can be found in the Getting Started with Intrusion Prevention on Sophos Firewall
chapter.
7. Site-to-Site Connections v19.0
1. Which is the control port used in RED connections?
This answer can be found in the Getting Started with Remote Ethernet Devices on Sophos Firewall
chapter.
2. You are in the process of deploying multiple RED devices. Due to bandwidth issues at the
head office, which 2 modes of deployment could be used so that only necessary traffic is routed
back to the head office?
3. In which type of IPsec VPN do you need to define the local and remote networks?
4. Which RED mode matches this description? Sophos Firewall is the DHCP server and default
gateway for the remote network. Only defined traffic is sent through the RED.
8. Authentication v19.0
1. What port number is used by Captive portal?
This answer can be found in the Getting Started with Sophos Firewall Authentication chapter.
2. Which 4 of the following are supported external authentication servers on Sophos Firewall
19.0?
3. Which 3 of the following forms of access can be secured using one-time passwords?
This answer can be found in the Enabling Multifactor Authentication on Sophos Firewall chapter.
4. What do you need to do in order to use NTLM and Kerberos for web authentication?
This answer can be found in the Getting Started with Sophos Firewall Authentication chapter.
This study source was downloaded by 100000887076760 from CourseHero.com on 07-16-2024 07:22:24 GMT -05:00
https://www.coursehero.com/file/181624581/sophos-et80-engineer-v19docx/
9. Web Protection v19.0
1. If you are using the Sophos Firewall as an explicit proxy, which web filtering option will be
used?
This answer can be found in the Sophos Firewall Web Protection Overview chapter.
2. When testing a new web policy, you are still able to access pages that should be blocked.
What is the most likely reason for this?
3. Which of these options IS supported when using the DPI Engine for Web Protection?
This answer can be found in the Configuring Web Protection on Sophos Firewall chapter.
10. Web Quotas and Shaping v19.0
1. Which method controls the amount of time users and groups spend on the Internet and
applies to all Internet traffic?
This answer can be found in the Sophos Firewall Web Protection Quotas and Traffic Shaping
chapter.
11. Web Quota Configuration v19.0
1. You have been asked to create a surfing quota for guests that allows access to the Internet
for 20 hours in a week and then terminates the connection with no recurrence.
This study source was downloaded by 100000887076760 from CourseHero.com on 07-16-2024 07:22:24 GMT -05:00
https://www.coursehero.com/file/181624581/sophos-et80-engineer-v19docx/
This study source was downloaded by 100000887076760 from CourseHero.com on 07-16-2024 07:22:24 GMT -05:00
https://www.coursehero.com/file/181624581/sophos-et80-engineer-v19docx/
12. Application Control v19.0
1. TRUE or FALSE. Application rules are applied to users and groups.
2. Which 4 of the following can traffic shaping policies be associated with?
This answer can be found in the Application Traffic Shaping on Sophos Firewall chapter.
13. Remote Access v19.0
1. Which 2 protocols does the Sophos Connect IPsec VPN client support?
2. When you download the IPsec remote access configuration you have two configuration files.
Which file type includes the advanced configuration?
This answer can be found in the Getting Started with Remote Access VPNs on Sophos Firewall
chapter.
3. TRUE or FALSE: The SSL VPN and User Portal can share the same port?
14. Wireless Security Modes v19.0
1. Which client traffic mode routes traffic to the network that the access point is connected to?
15. Wireless v19.0
1. What 2 of the following are methods that can be used to allow access to a wireless hotspot on
the Sophos Firewall?
This answer can be found in the Creating Hotspots on Sophos Firewall chapter.
2. TRUE or FALSE. DHCP can be used to override the wireless magic IP if the Sophos Firewall
is not the default gateway.
16. Logging and Reporting v19.0
1. You have created a report that displays data that you wish to check on a daily basis. How can
you make this data easily available in the WebAdmin interface?
This answer can be found in the Running and Customizing Reports on Sophos Firewall chapter.
2. What is the maximum number of external syslog servers you can configure on Sophos
Firewall?
17. Central Management and Reporting v19.0
1. Which option must be enabled before you can start managing your Sophos Firewall in
Sophos Central?
This answer can be found in the Managing Sophos Firewall in Sophos Central chapter.
2. TRUE or FALSE. When Central Firewall Management is in use, local rules on the Sophos
Firewall are only overwritten when a rule with the same name is created in Sophos Central.
This study source was downloaded by 100000887076760 from CourseHero.com on 07-16-2024 07:22:24 GMT -05:00
https://www.coursehero.com/file/181624581/sophos-et80-engineer-v19docx/
Powered by TCPDF (www.tcpdf.org)