ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 34 - NSE7_EFW-7.2 discussion

Report
Export

Exhibit.

Refer to the exhibit, which contains a partial policy configuration.

Which setting must you configure to allow SSH?

A.
Specify SSH in the Service field
Answers
A.
Specify SSH in the Service field
B.
Configure pot 22 in the Protocol Options field.
Answers
B.
Configure pot 22 in the Protocol Options field.
C.
Include SSH in the Application field
Answers
C.
Include SSH in the Application field
D.
Select an application control profile corresponding to SSH in the Security Profiles section
Answers
D.
Select an application control profile corresponding to SSH in the Security Profiles section
Suggested answer: A

Explanation:

Option A is correct because to allow SSH, you need to specify SSH in the Service field of the policy configuration.This is because the Service field determines which types of traffic are allowed by the policy1. By default, the Service field is set to App Default, which means that the policy will use the default ports defined by the applications.However, SSH is not one of the default applications, so you need to specify it manually or create a custom service for it2.

Option B is incorrect because configuring port 22 in the Protocol Options field is not enough to allow SSH.The Protocol Options field allows you to customize the protocol inspection and anomaly protection settings for the policy3. However, this field does not override the Service field, which still needs to match the traffic type.

Option C is incorrect because including SSH in the Application field is not enough to allow SSH.The Application field allows you to filter the traffic based on the application signatures and categories4. However, this field does not override the Service field, which still needs to match the traffic type.

Option D is incorrect because selecting an application control profile corresponding to SSH in the Security Profiles section is not enough to allow SSH. The Security Profiles section allows you to apply various security features to the traffic, such as antivirus, web filtering, IPS, etc. However, this section does not override the Service field, which still needs to match the traffic type.Reference: =

1: Firewall policies

2: Services

3: Protocol options profiles

4: Application control

asked 18/09/2024
Juan Jose Montero Caletrio
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first