Firewall V 18
Firewall V 18
Overview v18.0
1. Which 2 features are required if you want to make use of lateral movement protection?
The answer can be found in Module 1: XG Firewall Overview on slide 45.
2. Which of the following is an attack using a spoof email to persuade users to provide sensitive
information or credentials?
4. Interfaces v18.0
1. Which interface type is a group of interfaces that act as a single connection?
The answer can be found in Module 2: Getting Started with XG Firewall slide 48.
2. During troubleshooting you do not see as much information in the log files as you were expecting.
What setting needs to be changed to see all the traffic passing through a firewall rule?
The answer can be found in Module 3: Network Protection on slide 6.
3. Which 3 of the following are the default decryption profiles available in XG Firewall?
The answer can be found in Module 3: Network Protection on slide 35.
4. Which XG Firewall feature is able to block access to command and control servers?
5. Which XG Firewall feature sends decrypted packets to IPS, application control, web filtering and
antivirus for checking?
2. When creating a site-to-site VPN between an XG Firewall and another vendor’s firewall, what is the
best protocol to use?
3. You are working with sensitive corporate data and want to ensure that traffic from remote locations is
monitored and blocked from leaving the corporate LAN. What would be the most appropriate security mode
to deploy the RED devices in?
9. Authentication v18.0
1. Which 2 of the following statements about Firewall authenticaiton servers are TRUE?
The answer can be found in Module 5: Authentication on slide 8.
2. You have been asked to install STAS on your servers. Which 3 of the following are required for the
installation to be successful?
3. Which 2 methods can be used to generate one-time passwords for authenticating with the XG
Firewall?
The answer can be found in Module 5: Authentication on slide 48.
4. Which 4 of the following are supported external authentication servers on Sophos XG Firewall 18.0?
The answer can be found in Module 5: Authentication on slide 7.
2. Which page lists all current applications that are connecting through the XG Firewall?
2. Where in the XG Firewall can you enable SMTP relay for the zones you want to accept email from?
The answer can be found in Module 8: Email Protection on slide 6.
2. Which of the following best describes the Bridge to VLAN security mode for wireless networks?
2. What is the maximum number of external syslog servers you can configure on XG Firewall?
2. TRUE or FALSE: When Central Firewall Management is in use, local rules on the XG Firewall are
only overwritten when a rule with the same name is created in Sophos Central.
16. Labs v18.0
1. How do you enable and disable IPsec VPNs?
17. Images v18.0
1. The diagram below shows a company with two sites, one in London and in New York. Each site has
an Internet connection and is also connected via an MPLS. You are configuring a static route on the
London gateway to route traffic destined for the New York network over MPLS.
What IP address would need to go into the Gateway field to complete the static route shown above?
With the above options selected, which 2 of the following will be enabled in the default outbound firewall
rule once the Initial Setup wizard is complete?
3. You have configured one-time passwords. John Smith is trying to login to the User Portal; his
password is 'xgfirewall'. Below you can see the login screen and his token.
What does John Smith need to enter as the password to login?