
Checkpoint vol.1 - 31-60
Authored by . .
Computers
1st Grade
Used 17+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of Captive Portal?
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these is NOT a feature or benefit of Application Control?
Scans the content of files being downloaded by users in order to make policy decisions.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identity Awareness allows easy configuration for network access and auditing based on what three items?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Fill in the blank: The position of an Implied rule is manipulated in the _______ window.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How many layers make up the TCP/IP model?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?