“Do I Know This Already?” Quiz
The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 16-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes.”
Table 16-1 Do I Know This Already?” Section-to-Question Mapping
Foundation Topics Section
Questions
File Policy Essentials
1
Best Practices for File Policy Configuration
2
Fulfilling Prerequisites
3
Configuring a File Policy
4
Verification
5
Caution
The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as wrong for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.
1. Which type of analysis requires an external connection from a management center?
a. Local
b. Dynamic
c. High-fidelity
d. All of these answers are correct.
2. Which of the following is recommended when enabling a file policy?
a. Use the Reset Connection option on a file rule to block a file.
b. Avoid storing clean files using a file rule.
c. Keep the captured file size lower for optimal performance.
d. All of these answers are correct.
3. Which of the following does not require a malware license?
a. Sending a file to the cloud for dynamic analysis
b. Enabling a local analysis engine
c. Performing a cloud lookup without blocking a file
d. Blocking a file transfer based on its file format
4. Which of the following statements is incorrect in a file policy operation?
a. A threat defense can interrupt traffic flow if a cloud lookup fails or takes a long time.
b. A file policy uses the adaptive profile feature.
c. The management center sends a query to the cloud to detect the file type.
d. The management center connects to the cloud to obtain new signatures for malware.
5. Which of the following is not a valid malware disposition?
a. Malware
b. Clean
c. Unknown
d. Virus
Leave a Reply