Anda di halaman 1dari 14

1. A. B. C. D. 2. A. B. C. D. 3. A. B. C. D.

Which of the following does NOT describe third generation firewall technology (stateful packet inspection)? Tracks full communication session (state) from originating source Protects from Man-in-the-Middle attacks Provides Network Address Translation Only inspects the IP header (address) The ____, ____ and _____ all come with unlimited user licenses. TZ 170, PRO 2040 and PRO 3060 PRO 2040, PRO 4060 and TZ 170 PRO 4060, PRO 5060 and TZ 170 PRO 2040, PRO 3060and PRO 4060 Which of the following is NOT true of the SonicWALL firmware? Available at MySonicWALL.com Automated update notification Updated via the Serial Port Flash upgradeable through management interface

4. What is the factory default IP address of the SonicWALL? A. 192.168.1.168 B. 192.168.1.1 C. 192.168.168.168 D. 192.168.168.1 5. The Network Addressing Modes supported by SonicWALL are A. Transparent, NAT w/DHCP, NAT w/PPTP B. Transparent, NAT Enabled, NAT w/DHCP, NAT w/PPPoE, NAT w/LT2P, NAT w/PPTP C. Transparent, NAT, Pass-thru D. Transparent, Packet Filter, Proxy 6. Which one of the following is NOT true of Network Address Translation from LAN to WAN? A. Modifies the destination address B. Changes IP address as the packet goes through the firewall to the public internet C. Allows multiple systems to share one public IP address D. Hides your network IP addresses from attackers 7. In which of the following scenarios would you use Transparent Mode? A. When you have a public IP address on the WAN side and a private IP address on the LAN side B. When you are dynamically assigned an IP address from your ISP C. When you have public addresses on both sides of the SonicWALL D. When you want to hide your private addressing 8. Which one of the following best describes a Many-To-One NAT? A. Traffic comes to the second public IP address and is routed to the specific private address B. A public IP address is linked to a specific private IP address C. Traffic comes to the public address of the firewall and is routed to the private address of that service D. The process of "hiding" many private addresses behind one public address. 9. Which of the following are supported management methods? A. From the LAN interface B. From the LAN interface and remotely from the WAN interface C. By SonicWALL Global Management System D. All of the above

10. DES uses a key length of _____ bits. A. 162 B. 56 C. 128 D. 12 11. In SonicWALL's implementation, which description below is correct for VPN encryption A. Both 3DES and AES are hardware implementation, so AES is as fast as 3DES. B. 3DES is hardware implementation and AES is software implementation C. Both of AES and 3DES are software implementation D. Do not support AES at all. 12. Which of the following feature exists only in SonicOS Enhanced? A. Content Filtering B. Gateway Anti-Virus/ IPS /Anti-Spyware C. Dynamic DNS D. WAN Failover and Load Balancing 13. A MAC address is comprised of one of the following pairs of entities? A. IP address and Vendor code B. Vendor code and Serial Number C. Serial Number and LLC type code D. LLC type code and Vendor code 14. What is a firewall? A. A firewall is a router that connects a network to the Internet. B. A firewall is a gateway between the network and the Internet that protects the network or systems from hackers, crackers, and unauthorized users. C. A firewall is a device designed to minimize Internet access costs. D. All of the above 15. Choose the best answer about Dynamic DNS and SonicWALL implementation? A. Setup VPN Tunnels with Main Mode even when branch offices use ADSL line B. Access branch offices servers via domain name even when branch offices have no static IP addresses. C. Both SonicOS Standard and Enhanced in 3.0 and later support DDNS D. All of the above 16. Which of the following best represents 99% of the firewall market segment? A. Large Enterprises B. Small and Medium Enterprises C. Home Users D. Unemployed Dot-Commers 17. What integrated security features does the SonicWALL support? A. VPN B. Anti-Virus/Gateway Anti-Virus/IPS/Anti-Spyware C. Stateful Packet Inspection D. All of the Above 18. SonicWALL VPN supports the ___ encryption protocol(s), making SonicWALL interoperable with other VPN products with the same implementation. A. IPSec B. CRF C. IPX D. a and b but not c.

19. Which description about SonicWALL Gateway Anti-Virus is correct. A. SonicWALL can scan file size up to 500M per file B. SonicWALL can scan up to 2000 file download sessions C. SonicWALL can scan unlimited number of files with unlimited file size using the patent pending Deep Packet Inspection engine. D. SonicWALL Gateway Anti-Virus can NOT scan NetBIOS/SMB file sharing. 20. Which of the following description is correct about SonicWALL IPS A. SonicWALL IPS can NOT block IM and P2P like MSN,QQ etc. B. SonicWALL IPS has nearly 2000 signatures and can block about 100 IM and P2P applications like eMule, MSN, QQ etc. C. IPS on TZ170 has fewer signatures than PRO Series D. IPS is available on SonicOS Enhanced only. 21. IP v.4 allows _______________ discrete host addresses. A. 65,535.00 B. 4,000,000,000.00 C. 4,000,000.00 D. 255.255.255.253 22. Diffie-Hellman Groups available for use in VPN key exchange are: A. 1, 2, 3, 4, 5 B. 1, 2, 3 C. 3,4 D. 1, 2, 5 23. Which SonicOS firmware supports objects? A. SonicOS standard B. SonicOS enhanced C. SonicOS advanced D. both SonicOS enhanced and SonicOS advanced 24. Which products support OSPF Routing and 802.1q VLAN? A.PRO1260, PRO2040, PRO3060 B.TZ170, PRO1260, PRO2040 C. PRO4060 and PRO5060 D. None of the above 25. Which of the following statement is the best answer? A. SonicOS enhanced supports one-to-one NAT, many-to-one NAT B. SonicOS enhanced supports PAT (Port Address translation) C. SonicOS enhanced supports many-to-many NAT D. All of the above

26. SonicOS 2.5.0.1 enhanced and later supports: A. NAT mode B. Routing mode C. transparent mode D. All of the above

27. On which firewall interface will GVC (Global VPN Client) traffic terminate. Firewall is running SonicOS 2.5.0.1 enhanced and later. A. LAN and WAN B. DMZ and WLAN C. WAN and WLAN D. LAN, WAN, DMZ and WLAN 27. In SonicOS enhanced firmware (all versions), for incoming traffic (i.e. from WAN to LAN), which of the following is true? A. NAT is processed first then firewall rules B. Firewall rules is processed first then NAT C. NAT and firewall rules are processed in parallel D. non of the above 28. There is a IPSec VPN tunnel built between remote site and headquarters. How can you restrict a remote user to access a server in headquarters? A. use firewall rule B. use NAT policy C. use IPSec VPN parameters D. use IP Helper 28. In a client to site IPSec VPN environment, how can you allow the client to HTTP but restrict FTP on the same server? A. use address objects B. use service objects C. use zone objects D. none of the above 29. Which description about IPS is correct: A. IPS protects WAN to LAN direction only B. IPS protects intrusion between all different zones C. IPS does not work if firewall works in transparent mode. D. None of the above 30. Which scenario below needs static route configuration on SonicWALL when SonicWALL OSPF or RIP routing is not enabled. A. There is a L3 Switch on SonicWALL LAN interface B. There is a Router on SonicWALL DMZ network which connects to a partners network. C. There is a L2 Switch connected to the LAN port of SonicWALL D. Both A and B 31. With address object, you can: A. have an address object in 1 address group only B. have an address object in more than 2 address group C. have an address object in no more than 3 address groups D. have an address object in as many address groups as you want 32. In a HF (Hardware Failover) configuration running SonicOS enhanced, two PRO3060/4060/5060 synchronize its status and configuration using: A. any interface (X0, X1, X2, X3, X4 and X5) B. any spare interface (X2, X3, X4 and X5) C. interface X5 only D. none of the above

33. How large is the Intrusion Prevention signature database? A. 1,200+ B. 1,400+ C. 1,600+ D. 1,900+ 33. How does the IPS signature database get updated? A. CD distribution B. online auto update via internet C. manual update via internet D. update through www.mysonicwall.com 34. What is the technology used in IPS (Intrusion Prevention Service) A. Stateful packet inspection B. Thorough packet inspection C. Deep packet inspection D. Complete packet inspection 35. Where can you see the IPS attacks?

A. Firewall log B. ViewPoint C. SGMS D. All of the above 36. How do I manage my SonicWALL Intrusion Prevention Service subscription? A. Security administrators can manage the intrusion prevention policy and signature database directly on theSonicWALL appliance. B. SonicWALL Global Management System C. CLI. D. Both A & B 37. On which SonicWALL product is SonicWALL Intrusion Prevention Service available? A. PRO 200, TZ 170 and PRO 3060 B. Soho 3 , TZ 170 and PRO 2040 C. PRO 330,PRO 3060 and PRO 4060 D. TZ 170 , PRO 2040 and PRO 3060 38. How is SonicWALL IPS licensed? A. SonicWALL IPS is licensed as a service through the DEA Licensing Framework. B. Any IPS-capable device has the option for a free 30-day trial, as well as an annual subscription. C. SonicWALL IPS has an expiration date and a signature timestamp indicating how up-to-date the signatures are. D. All of the above . 39. What is the difference between IPS Detection vs. IPS Prevention? A. When the Detection setting is Enabled for a group (or a signature), the SonicWALL will log and alert any traffic that matches that signature, but will not take any action against the traffic, and the connection will proceed to its intended destination. B. When the Prevention setting is Enabled for a group (or signature), the SonicWALL will actively drop and reset the connection, and prevent the connection from reaching its intended destination. C. In simpler terms, Detection tells you something is wrong, but Prevention actually goes and does something about it. D. All of the above.

40. Which is right about IPS signature? A. SonicWALL IPS includes the open-source Snort signatures, use the Snort engine B. SonicWALL IPS includes the open-source Snort signatures, does not use the Snort engine C. SonicWALL IPS excludes the open-source Snort signatures, use the Snort engine D. SonicWALL IPS excludes the open-source Snort signatures, does not use the Snort engine 41. Which is interface/zone can activate SonicWALL IPS ? A. LAN B. WAN C. DMZ D. Every Single Interface / Zone 42. Which is right about the Priority Levels in SonicWALL IPS? A. High Priority Attacks - These attacks are the most dangerous to your network. They can take down yourentire network or disable servers, such as various Backdoor, DDoS, and DOS attacks. B. Medium Priority Attacks - These attacks can cause disruption to your network, such as increased network traffic that slows down performance. For example, various DNS, FTP, and Telnet attacks. C. Low Priority Attacks - These attacks are characterized more as informational events, such as various Scan,RPC, and SMTP attacks. D. IM (Instant Messaging) Applications - These signatures protect your network from the vulnerabilities ofInstant Messaging applications, such as ICQ, MSN, IRC, AIM, Yahoo, and QQ. E. P2P (Peer-to-Peer) Applications - These signatures protect your network from the vulnerabilities of P2Papplications, such as Gnutella, Fastrack, Kazaa, Morpheus, and eDonkey. E. All of the above. 43. Choose the best answer for SonicWALL VoIP solution. A. SonicWALL supports H.323 version 1 to version 5 and SIP protocols B. SonicWALL IPS can prevent attacks to H.323 vulnerability C. Full syntax validation of all VoIP signaling and media packets D. All of the above

44. Which description below is NOT correct about PRO5060 ? A. More than 1Gbps http throughput for normal packet size B. 1Gbps throughput is UDP throughput, http is slower C. PRO5060 has one year free Gateway Anti-virus/IPS/Anti-Spyware D. PRO5060 supports Dual WAN Load balancing and policy based routing 45. How many firewall policies can create in the PRO 5060 ? A. 100 B. 1000 C. 5000 D. 15000 46. How many Global VPN Client sessions can the PRO 5060 support ? A. 100 B. 2000 C. 6000 D. 10000 47. Which description about SonicPoint is correct? A. SonicPoint can work with all SonicWALL Gen4 products running SonicOS Enhanced. B. Both SonicOS Enhanced and SonicOS Standard support SonicPoint C. Only PRO Series products, no matter Standard OS or Enhanced OS, support SonicPoint. D. SonicPoint does not support securities services as wireless has no security features.

48. All SonicWALL products include __ hardware warranty. A. 3 Years B. 2 Years C. 1 Years D. 4 Years 49. Which SonicWALL model includes a built-in 24-port switch? A. PRO1260 B. PRO 2040 C. PRO 3060 D. PRO 4060 50. When registering as a new user at MySonicwall.com, you must enter a subscription code which you can find in a confirmation email to activate your account , otherwise, your account will be deleted in ____ hours A. 24 B. 48 C. 72 D. 100 dreamer77 2005-11-16 18:11:16 1. Which of the following does NOT describe third generation firewall technology (stateful packet inspection)? A. Tracks full communication session (state) from originating source B. Protects from Man-in-the-Middle attacks C. Provides Network Address Translation D. Only inspects the IP header (address) CNAT 2. The ____, ____ and _____ all come with unlimited user licenses. A. TZ 170, PRO 2040 and PRO 3060 B. PRO 2040, PRO 4060 and TZ 170 C. PRO 4060, PRO 5060 and TZ 170 D. PRO 2040, PRO 3060and PRO 4060 DTZ17010253 3. Which of the following is NOT true of the SonicWALL firmware? A. Available at MySonicWALL.com B. Automated update notification C. Updated via the Serial Port D. Flash upgradeable through management interface CWebSonicwall 4. What is the factory default IP address of the SonicWALL? A. 192.168.1.168 B. 192.168.1.1 C. 192.168.168.168 D. 192.168.168.1 CIP 5. The Network Addressing Modes supported by SonicWALL are A. Transparent, NAT w/DHCP, NAT w/PPTP B. Transparent, NAT Enabled, NAT w/DHCP, NAT w/PPPoE, NAT w/LT2P, NAT w/PPTP C. Transparent, NAT, Pass-thru D. Transparent, Packet Filter, Proxy

B 6. Which one of the following is NOT true of Network Address Translation from LAN to WAN? A. Modifies the destination address B. Changes IP address as the packet goes through the firewall to the public internet C. Allows multiple systems to share one public IP address D. Hides your network IP addresses from attackers A 7. In which of the following scenarios would you use Transparent Mode? A. When you have a public IP address on the WAN side and a private IP address on the LAN side B. When you are dynamically assigned an IP address from your ISP C. When you have public addresses on both sides of the SonicWALL D. When you want to hide your private addressing C 8. Which one of the following best describes a Many-To-One NAT? A. Traffic comes to the second public IP address and is routed to the specific private address B. A public IP address is linked to a specific private IP address C. Traffic comes to the public address of the firewall and is routed to the private address of that service D. The process of "hiding" many private addresses behind one public address. D 9. Which of the following are supported management methods? A. From the LAN interface B. From the LAN interface and remotely from the WAN interface C. By SonicWALL Global Management System D. All of the above D 10. DES uses a key length of _____ bits. A. 162 B. 56 C. 128 D. 12 B 11. In SonicWALL's implementation, which description below is correct for VPN encryption A. Both 3DES and AES are hardware implementation, so AES is as fast as 3DES. B. 3DES is hardware implementation and AES is software implementation C. Both of AES and 3DES are software implementation D. Do not support AES at all. A 12. Which of the following feature exists only in SonicOS Enhanced? A. Content Filtering B. Gateway Anti-Virus/ IPS /Anti-Spyware C. Dynamic DNS D. WAN Failover and Load Balancing DAB 13. A MAC address is comprised of one of the following pairs of entities? A. IP address and Vendor code B. Vendor code and Serial Number C. Serial Number and LLC type code D. LLC type code and Vendor code

B 14. What is a firewall? A. A firewall is a router that connects a network to the Internet. B. A firewall is a gateway between the network and the Internet that protects the network or systems from hackers, crackers, and unauthorized users. C. A firewall is a device designed to minimize Internet access costs. D. All of the above B 15. Choose the best answer about Dynamic DNS and SonicWALL implementation? A. Setup VPN Tunnels with Main Mode even when branch offices use ADSL line B. Access branch offices servers via domain name even when branch offices have no static IP addresses. C. Both SonicOS Standard and Enhanced in 3.0 and later support DDNS D. All of the above D 16. Which of the following best represents 99% of the firewall market segment? A. Large Enterprises B. Small and Medium Enterprises C. Home Users D. Unemployed Dot-Commers B 17. What integrated security features does the SonicWALL support? A. VPN B. Anti-Virus/Gateway Anti-Virus/IPS/Anti-Spyware C. Stateful Packet Inspection D. All of the Above D 18. SonicWALL VPN supports the ___ encryption protocol(s), making SonicWALL interoperable with other VPN products with the same implementation. A. IPSec B. CRF C. IPX D. a and b but not c. A 19. Which description about SonicWALL Gateway Anti-Virus is correct. A. SonicWALL can scan file size up to 500M per file B. SonicWALL can scan up to 2000 file download sessions C. SonicWALL can scan unlimited number of files with unlimited file size using the patent pending Deep Packet Inspection engine. D. SonicWALL Gateway Anti-Virus can NOT scan NetBIOS/SMB file sharing. C 20. Which of the following description is correct about SonicWALL IPS A. SonicWALL IPS can NOT block IM and P2P like MSN,QQ etc. B. SonicWALL IPS has nearly 2000 signatures and can block about 100 IM and P2P applications like eMule, MSN, QQ etc. C. IPS on TZ170 has fewer signatures than PRO Series D. IPS is available on SonicOS Enhanced only. B 21. IP v.4 allows _______________ discrete host addresses.

A. 65,535.00 B. 4,000,000,000.00 C. 4,000,000.00 D. 255.255.255.253 B 22. Diffie-Hellman Groups available for use in VPN key exchange are: A. 1, 2, 3, 4, 5 B. 1, 2, 3 C. 3,4 D. 1, 2, 5 D 23. Which SonicOS firmware supports objects? A. SonicOS standard B. SonicOS enhanced C. SonicOS advanced D. both SonicOS enhanced and SonicOS advanced B 24. Which products support OSPF Routing and 802.1q VLAN? A.PRO1260, PRO2040, PRO3060 B.TZ170, PRO1260, PRO2040 C. PRO4060 and PRO5060 D. None of the above C 25. Which of the following statement is the best answer? A. SonicOS enhanced supports one-to-one NAT, many-to-one NAT B. SonicOS enhanced supports PAT (Port Address translation) C. SonicOS enhanced supports many-to-many NAT D. All of the above D 26. SonicOS 2.5.0.1 enhanced and later supports: A. NAT mode B. Routing mode C. transparent mode D. All of the above D 27. On which firewall interface will GVC (Global VPN Client) traffic terminate. Firewall is running SonicOS 2.5.0.1 enhanced and later. A. LAN and WAN B. DMZ and WLAN C. WAN and WLAN D. LAN, WAN, DMZ and WLAN D 27. In SonicOS enhanced firmware (all versions), for incoming traffic (i.e. from WAN to LAN), which of the following is true? A. NAT is processed first then firewall rules B. Firewall rules is processed first then NAT C. NAT and firewall rules are processed in parallel

D. non of the above A 28. There is a IPSec VPN tunnel built between remote site and headquarters. How can you restrict a remote user to access a server in headquarters? A. use firewall rule B. use NAT policy C. use IPSec VPN parameters D. use IP Helper A 28. In a client to site IPSec VPN environment, how can you allow the client to HTTP but restrict FTP on the same server? A. use address objects B. use service objects C. use zone objects D. none of the above 29. Which description about IPS is correct: A. IPS protects WAN to LAN direction only B. IPS protects intrusion between all different zones C. IPS does not work if firewall works in transparent mode. D. None of the above 30. Which scenario below needs static route configuration on SonicWALL when SonicWALL OSPF or RIP routing is not enabled. A. There is a L3 Switch on SonicWALL LAN interface B. There is a Router on SonicWALL DMZ network which connects to a partners network. C. There is a L2 Switch connected to the LAN port of SonicWALL D. Both A and B D 31. With address object, you can: A. have an address object in 1 address group only B. have an address object in more than 2 address group C. have an address object in no more than 3 address groups D. have an address object in as many address groups as you want D 32. In a HF (Hardware Failover) configuration running SonicOS enhanced, two PRO3060/4060/5060 synchronize its status and configuration using: A. any interface (X0, X1, X2, X3, X4 and X5) B. any spare interface (X2, X3, X4 and X5) C. interface X5 only D. none of the above C 33. How large is the Intrusion Prevention signature database? A. 1,200+ B. 1,400+ C. 1,600+ D. 1,900+ D

33. How does the IPS signature database get updated? A. CD distribution B. online auto update via internet C. manual update via internet D. update through www.mysonicwall.com 34. What is the technology used in IPS (Intrusion Prevention Service) A. Stateful packet inspection B. Thorough packet inspection C. Deep packet inspection D. Complete packet inspection 35. Where can you see the IPS attacks? A. Firewall log B. ViewPoint C. SGMS D. All of the above 36. How do I manage my SonicWALL Intrusion Prevention Service subscription? A. Security administrators can manage the intrusion prevention policy and signature database directly on theSonicWALL appliance. B. SonicWALL Global Management System C. CLI. D. Both A & B : D 37. On which SonicWALL product is SonicWALL Intrusion Prevention Service available? A. PRO 200, TZ 170 and PRO 3060 B. Soho 3 , TZ 170 and PRO 2040 C. PRO 330,PRO 3060 and PRO 4060 D. TZ 170 , PRO 2040 and PRO 3060 :D 38. How is SonicWALL IPS licensed? A. SonicWALL IPS is licensed as a service through the DEA Licensing Framework. B. Any IPS-capable device has the option for a free 30-day trial, as well as an annual subscription. C. SonicWALL IPS has an expiration date and a signature timestamp indicating how up-to-date the signatures are. D. All of the above . : D 39. What is the difference between IPS Detection vs. IPS Prevention? A. When the Detection setting is Enabled for a group (or a signature), the SonicWALL will log and alert any traffic that matches that signature, but will not take any action against the traffic, and the connection will proceed to its intended destination. B. When the Prevention setting is Enabled for a group (or signature), the SonicWALL will actively drop and reset the connection, and prevent the connection from reaching its intended destination. C. In simpler terms, Detection tells you something is wrong, but Prevention actually goes and does something about it. D. All of the above. :D 40. Which is right about IPS signature?

A. SonicWALL IPS includes the open-source Snort signatures, use the Snort engine B. SonicWALL IPS includes the open-source Snort signatures, does not use the Snort engine C. SonicWALL IPS excludes the open-source Snort signatures, use the Snort engine D. SonicWALL IPS excludes the open-source Snort signatures, does not use the Snort engine B 41. Which is interface/zone can activate SonicWALL IPS ? A. LAN B. WAN C. DMZ D. Every Single Interface / Zone D 42. Which is right about the Priority Levels in SonicWALL IPS? A. High Priority Attacks - These attacks are the most dangerous to your network. They can take down yourentire network or disable servers, such as various Backdoor, DDoS, and DOS attacks. B. Medium Priority Attacks - These attacks can cause disruption to your network, such as increased network traffic that slows down performance. For example, various DNS, FTP, and Telnet attacks. C. Low Priority Attacks - These attacks are characterized more as informational events, such as various Scan,RPC, and SMTP attacks. D. IM (Instant Messaging) Applications - These signatures protect your network from the vulnerabilities ofInstant Messaging applications, such as ICQ, MSN, IRC, AIM, Yahoo, and QQ. E. P2P (Peer-to-Peer) Applications - These signatures protect your network from the vulnerabilities of P2Papplications, such as Gnutella, Fastrack, Kazaa, Morpheus, and eDonkey. E. All of the above. E 43. Choose the best answer for SonicWALL VoIP solution. A. SonicWALL supports H.323 version 1 to version 5 and SIP protocols B. SonicWALL IPS can prevent attacks to H.323 vulnerability C. Full syntax validation of all VoIP signaling and media packets D. All of the above D 44. Which description below is NOT correct about PRO5060 ? A. More than 1Gbps http throughput for normal packet size B. 1Gbps throughput is UDP throughput, http is slower C. PRO5060 has one year free Gateway Anti-virus/IPS/Anti-Spyware D. PRO5060 supports Dual WAN Load balancing and policy based routing B 45. How many firewall policies can create in the PRO 5060 ? A. 100 B. 1000 C. 5000 D. 15000 D 46. How many Global VPN Client sessions can the PRO 5060 support ? A. 100 B. 2000 C. 6000

D. 10000 B 47. Which description about SonicPoint is correct? A. SonicPoint can work with all SonicWALL Gen4 products running SonicOS Enhanced. B. Both SonicOS Enhanced and SonicOS Standard support SonicPoint C. Only PRO Series products, no matter Standard OS or Enhanced OS, support SonicPoint. D. SonicPoint does not support securities services as wireless has no security features. A 48. All SonicWALL products include __ hardware warranty. A. 3 Years B. 2 Years C. 1 Years D. 4 Years C 49. Which SonicWALL model includes a built-in 24-port switch? A. PRO1260 B. PRO 2040 C. PRO 3060 D. PRO 4060 A 50. When registering as a new user at MySonicwall.com, you must enter a subscription code which you can find in a confirmation email to activate your account , otherwise, your account will be deleted in ____ hours A. 24 B. 48 C. 72 D. 100 C

Anda mungkin juga menyukai