
CCSA-2
Authored by Shonnie Pros
Information Technology (IT)
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Source Port Address Translation (PAT) is enabled by default.
Automatic NAT rules are supported for Network objects only.
Automatic NAT rules are supported for Host objects only.
Source Port Address Translation (PAT) is disabled by default.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is true about Stateful Inspection?
Stateful Inspection requires that a server reply to a request, in order to track a connection's state
Stateful Inspection looks at both the headers of packets, as well as deeply examining their content.
Stateful Inspection requires two rules, one for outgoing traffic and one for incoming traffic.
Stateful Inspection requires two rules, one for outgoing traffic and one for incoming traffic.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the user ID of a user that have all the privileges of a root user?
User ID 1
User ID 2
User ID 0
User ID 99
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the two elements of address translation rules?
Original packet and translated packet
Manipulated packet and original packet
Translated packet and untranslated packet
Untranslated packet and manipulated packet
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A _______ license requires an administrator to designate a gateway for attachment whereas a _______ license is automatically attached to a Security Gateway.
Formal; corporate
Local; central
Local; formal
Central; local
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
RADIUS protocol uses _________ to communicate with the gateway.
UDP
CCP
TDP
HTTP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
Application Control
Threat Emulation
Data Awareness
Identity Awareness
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?