Multiple Choice
What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway?
A) In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column) . Send these logs to a secondary log server for a complete logging history. Use your normal log server for standard logging for troubleshooting. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column) . Send these logs to a secondary log server for a complete logging history. Use your normal log server for standard logging for troubleshooting.
B) Install the View Implicit Rules package using SmartUpdate. Install the View Implicit Rules package using SmartUpdate.
C) Define two log servers on the R77 Gateway object. Lof Implied Rules on the first log server. Enable Log Rule Base on the second log server. Use SmartReporter to merge the two log server records into the same database for HIPPA log audits. Define two log servers on the R77 Gateway object. Lof Implied Rules on the first log server. Enable Log Rule Base on the second log server. Use SmartReporter to merge the two log server records into the same database for HIPPA log audits.
D) Check the Log Implied Rules Globally box on the R77 Gateway object. Check the Log Implied Rules Globally box on the R77 Gateway object.
Correct Answer:

Verified
Correct Answer:
Verified
Q243: You have successfully backed up your Check
Q244: You have enabled "Full Log" as a
Q245: Fill in the blanks: Default port numbers
Q246: Which of the following is the most
Q247: What does it mean if Deyra sees
Q249: How do you configure an alert in
Q250: Your bank's distributed R77 installation has Security
Q251: Which of the following authentication methods can
Q252: What is the difference between an event
Q253: Which one of the following is TRUE?<br>A)