补充几题(从其他人的考题中剔除重复的)
1.Why is the time setting a critical factor?
+A.  Because issues with time based rules/profiles, certificates, log files and licensing might arise B.  Because timing is important for keeping the correct processing speed C.  Timing is important in E-mail processing D.  Correct timing is not important at all
 
2.What updates will be covered by the Up2Date process if I have bought the base license and all optional subscriptions?
A.  Firmware Updates, Pattern Updates including anti-virus, anti-spyware, anti-spam B.  Firmware Updates, Pattern Updates including intrusion protection signatures +C.  Firmware Updates, Pattern Updates including anti-virus, anti-spam, intrusion protection definitions D.  Firmware Updates only.
 
3.How can I update the software if Astaro Security Gateway is not connected to the Internet?
A.  With the Astaro Update CD, which can be ordered from http://my.astaro.com B.  With any USB Memory Stick containing a more recent ISO file +C.  Update packages can be downloaded from Astaro's FTP server at ftp://ftp.astaro.com. D.  Not at all  
4.Is it possible to change the type of a definition after is has been saved?
A.  Yes +B.  No C.  Only with unused services D.  Only when not changing from/to type "group"
 
5.How many interface definitions must be made when ASG must be configured for providing DHCP relay?
+A.  At least 2 - one to relay from and one to relay to B.  At least 3 - one to relay from, to and through C.  This works only on 1 Interface D.  DHCP Relay needs to have 2 bridges configured, which makes a total of 4 necessary interfaces
 
6. What kind of function describes "Request Routing" on ASG?
*A.  The function to send different DNS requests to specific, responsible DNS servers B.  The function to send different SMTP requests to specific, responsible SMTP servers XC.  The function to send different HTTP requests to specific, responsible HTTP servers D.  There is no such feature
 
7.What happens to packets not matching any routing table entry?
+A.  They are discarded, the sender will be notified with "ICMP, No route to host" B.  They are being sent back C.  They are sent to a random gateway D.  They are sent to the Quarantine
 
8.What happened when downloading eicar.com from the Labserver?
A.  Nothing +B.  It was blocked by the Virus Protection C.  It was replaced with an Astaro Logo D.  It was stripped from the download
 
9.Name the HTTP Proxy Modes available on ASG V7.
+A.  Standard, Transparent, User Authentication, Active Directory, eDirectory B.  Manual and Automatic C.  Generic and Standard D.  Static and Volatile
 
10.What happens if you have time-based profiles for groups during the working hours created but nothing defined for after hours?
A.  Nothing +B.  Surfing will not be possible outside the defined hours C.  Surfing will only be allowed outside the defined hours D.  No profile will work
 
11.What is the fundamental difference between a packet-filter, a circuit relay and a proxy?
+A.  An application proxy understands the application protocol, packet-filter and circuit relay do not. B.  A circuit relay supports authentication, the proxy does not. C.  Packet-filtering takes place on layer 7 of the ISO/OSI layer model, above the layers handled by a proxy. D.  Packet-filtering supports authentication, the proxy does not.
 
12. What is the configurable points range of the Spam Detection thresholds for warning and quaratine?
A.  0-15 XB.  0-30 C.  "1-15" D.  Depends if "Aggressive" is selected vs. "Conservative". *E.  Off, 1-30
 
13.Which SMTP proxy module allows the selective filtering of p_w_uploads based on the extension?
A.  Attachment Filter B.  Recipient Filter C.  Malicous File Blocker D.  Sender Blacklist +E.  File Extension Filter F.  Keyword Filter
 
14. What happens if BATV is turned on?
A.  A fixed number is added to every e-mail +B.  A cryptographic value is added to the sender's e-mail address during SMTP transaction XC.  A value for every outgoing e-mail is calculated and sent to a database to mark it as HAM *D.  For incoming e-mails containing no sender's address the recipients e-mail address is scanned for a cryptographic value
 
15. Which SMTP proxy feature allows the selective filtering of strings within an e-mail message?
*A.  Expression Filter B.  Recipient Verification C.  Extension Filter D.  Pattern Filter XE.  By enabling TLS transaction encryption to ensure that incoming mails are from trusted sources.
 
16.What are possible configuration options to avoid SPAM if you use the POP3 proxy?
+A.  Heuristic Spam Check B.  Configure File Extension Filter C.  Configure BATV, Greylisting +D.  Perform URL check E.  Configure Exceptions