Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.
To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command
Which of the following are authentication methods that Security Gateway R77 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.
Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any location. How would you configure authentication on the Gateway? With a: