“Do I Know This Already?” Quiz
The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 21-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes.”
Table 21-1 “Do I Know This Already?” Section-to-Question Mapping
Foundation Topics Section | Questions |
Secure Firewall Logging Essentials | 1 |
Best Practices for Logging | 2 |
Prerequisites | 3 |
Sending Syslog from Threat Defense | 4 |
Sending Syslog from Management Center | 5 |
Troubleshooting Logs | 6 |
Caution
The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as wrong for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.
1. Which of the following keywords does not represent a severity level?
- ALERT
- AUDIT
- DEBUG
- INFO
2. Which of the following statements is false?
- Secure Firewall can rate-limit syslog messages based on severity levels.
- Secure Firewall can send syslog messages for connection events.
- Syslog over UDP can introduce extra overhead in a large deployment.
- If the TCP syslog server goes down, user traffic cannot continue through Secure Firewall.
3. What is the standard port number of the syslog protocol?
- UDP 514
- TCP 1470
- Both UDP 514 and TCP 1470
- None of these answers are correct.
4. Which of the following options can be configured in the Platform Settings policy?
- Adding a custom banner
- Setting up time synchronization
- Sending syslog messages
- All of these answers are correct.
5. Which of the following event types can be used as a constraint in a correlation rule?
- Discovery events
- Intrusion and file events
- Connection events
- All of these answers are correct.
6. What is included in the Secure Firewall troubleshooting file package?
- Command output
- Database search queries
- Syslogs of running processes
- All of these answers are correct.
Leave a Reply