0
[{"id":45481,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:08:56","updated_at":"2016-03-18 12:08:56","questionName":"Your bank's distributed R77 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45482,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:12:29","updated_at":"2016-03-18 12:12:29","questionName":"When launching SmartDashboard, what information is required to log into R77?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45487,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:16:43","updated_at":"2016-03-18 12:16:43","questionName":"Which of the following is a hash algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45480,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:06:10","updated_at":"2016-03-18 12:06:10","questionName":"You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management wants a report detailing the current software level of each Enterprise class Security Gateway. You plan to take the opportunity to create a proposal outline, listing the most cost- effective way to upgrade your Gateways. Which two SmartConsole applications will you use to create this report and outline?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45490,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:18:02","updated_at":"2016-03-18 12:18:02","questionName":"Which of the following uses the same key to decrypt as it does to encrypt?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45485,"quiz_id":"3746","answer_id":null,"answerType_id":"0","created_at":"2016-03-18 12:15:50","updated_at":"2016-03-18 12:15:50","questionName":"Message digests use which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]