Fill in the blanks: Gaia can be configured using the ____ or ____
Security Gateway software blades must be attached to what?
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Fill in the blank: Back up and restores can be accomplished through_________.
Which of the following is NOT an identity source used for Identity Awareness?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Which of the following is NOT an advantage to using multiple LDAP servers?