For which of these third party authentication methods must you specify a search base? (Select two.)
When you configure the Global Application Control action, it is automatically applied to all policies.
When you examine the log messages In Traffic Monitor, you see that some network packets are denied with an unhandled packet log message. What does this log massage mean? (Select one.)
How can you include log messages from more than one Firebox in a single report generated by Dimension? (Select two.)
Clients on the trusted network need to connect to a server behind a router on the optional network.
Based on this image, what static route must be added to the Firebox for traffic from clients on the trusted network to reach a server at 10.0.20.100? (Select one.)
You configured four Device Administrator user accounts for your Firebox. To see a report of witch Device Management users have made changes to the device configuration, what must you do? (Select two.)
While troubleshooting a branch office VPN tunnel, you see this log message:
2014-07-23 12:29:15 iked (203.0.113.10<->203.0.113.20) Peer proposes phase one encryption 3DES, expecting AES
What settings could you modify in the local device configuration to resolve this issue? (Select one.)
What settings must you device configuration file include for Gateway AntiVirus to protect users on your network? (Select two.)
You have a privately addressed email server behind your Firebox. If you want to make sure that all traffic from this server to the Internet appears to come from the public IP address 203.0.113.25, regardless of policies, which from of NAT would you use? (Select one.)
Which WatchGuard tools can you use to review the log messages generated by your Firebox? (Select three).
If you disable the Outgoing policy, which policies must you add to allow trusted users to connect to commonly used websites? (Select three.)
Users on the trusted network cannot browse Internet websites.
Based on the configuration shown in this image, what could be the problem with this policy configuration? (Select one.)
Which policies can use the Intrusion Prevention Service to block network attacks? (Select one?)
If your Firebox has a single public IP address, and you want to forward inbound traffic to internal hosts based on the destination port, which type of NAT should you use? (Select one.)