Chapter 2. Deployment of Secure Firewal virtual Flashcards

1
Q

1.Which of the following virtual platforms is supported to run Secure Firewall Version 7.0?

A. VMware Workstation

B. VMware Player

C. VMware Fusion

D. VMware ESXi

A

D. You can deploy Secure Firewall Version 7.0 on VMware ESXi Version 6.5 or later. Other virtualization platforms, such as VMware Workstation, VMware Player, VMware Fusion, VMware vCloud Director, and VirtualBox, are not supported by Secure Firewall Version 7.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.What is the recommended amount of memory you should allocate to a management center virtual appliance to manage eight threat defense devices?

A. 16 GB

B. 28 GB

C. 32 GB

D. 64 GB

A

C. The recommended amount of memory for a management center virtual appliance to manage up to 25 threat defense devices is 32 GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.Which of the following is a disk file of a Secure Firewall virtual appliance?

A. TAR.GZ

B. VMDK

C. OVF

D. MF

A

B. The Virtual Machine Disk (.vmdk) file is a compressed virtual disk that stores the Secure Firewall software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.Which network adapter provides the maximum throughput?

A. E1000

B. VMXNET2 (Enhanced)

C. VMXNET3

D. VMXNET-X

A

C. The throughput of a VMXNET3 adapter is 10 Gbps, whereas the legacy default adapter E1000 supports up to 1 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.How many total interfaces are required to deploy a threat defense virtual appliance?

A. One

B. Two

C. Three

D. Four

A

D. A threat defense virtual appliance requires four interfaces—one interface for management communication and three interfaces for traffic inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.Which of the following statements is true?

A. You can install an ISO image file to deploy a management center virtual appliance.

B. A threat defense virtual appliance supports a maximum of four interfaces.

C. An OVF template for ESXi can also be used to deploy Secure Firewall in the cloud.

D. Promiscuous mode must be enabled in all the data interfaces of a threat defense virtual appliance.

A

D. Promiscuous mode must be enabled in all the data interfaces of a threat defense virtual appliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.Which of the following statements is false?

A. Abruptly powering off a virtual appliance can corrupt its system database.

B. Answering Yes to the question “Manage the Device Locally” enables device manager services.

C. Secure Firewall software enables you to configure the management IP address both manually and using DHCP.

D. For security reasons, SSH access to Secure Firewall is disabled by default.

A

D. SSH access to the management center and threat defense is enabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.Which protocols can be used to connect to Secure Firewall for management purposes?

A. HTTP and HTTPS.

B. HTTPS and SSH.

C. SSH and Telnet.

D. All of these answers are correct.

A

B. Only protocols such as HTTPS and SSH that support encrypted communication are used in Secure Firewall for management communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly