When enabling hyper-threading on a Security Gateway, the administrator needs to make sure there is enough _______________ to support additional CoreXL Firewall instances.
When enabling hyper-threading on a Security Gateway, the administrator needs to make sure there is enough _______________ to support additional CoreXL Firewall instances.A . drive spaceB . cpu’sC . available cacheD . available memoryView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk93000
Of how many packets consists Main Mode in Phase 1?
Of how many packets consists Main Mode in Phase 1?A . Three packetsB . Four packetsC . Six packetsD . it depends on the encryption algorithm used. 3DES has three times more packets than DES encryptionView AnswerAnswer: C
What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?
What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?A . avspB . dlpu and rad processesC . cptaD . cpm and fwmView AnswerAnswer: B
Which of the following ports are used for SIC?
Which of the following ports are used for SIC?A . 18355 and 18356B . 18210 and 18211C . 257 and 258D . 18192 and 18193View AnswerAnswer: B Explanation: Reference: http://digitalcrunch.com/check-point-firewall/list-of-check-point-ports/
How many layers are incorporated in IPS detection and what are they called?
How many layers are incorporated in IPS detection and what are they called?A . 4 layers C Passive Streaming Library (PSL), Protocol Parsers, Context Management, ProtectionsB . 3 layers C Active Streaming Library (ASL), CMI, ProtectionsC . 4 layers C Active Streaming Library (ASL), Protocol Parsers, Context Management, ProtectionsD ....
What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?
What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?A . dyn_nat_tableB . connectionC . nat_dyn_tableD . fwx_allocView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk32224
In order to test ClusterXL failovers which command would you use on one of the ClusterXL nodes to initiate a failover?
In order to test ClusterXL failovers which command would you use on one of the ClusterXL nodes to initiate a failover?A . clusterXL_admin down -pB . cluster XL_admin up -pC . cphaprob -d TEST -s ok registerD . cphaprob -d TEST -s problem unregisterView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/ CP_R76_ClusterXL_AdminGuide/7298.htm#o97358
Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet ______________.
Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet ______________.A . getting the routing information according to the Forwarding Information Base (FIB)B . being processed by the firewall kernel moduleC . going through the slow pathD . being forced...
Which of the following inputs is suitable for debugging HTTPS inspection issues?
Which of the following inputs is suitable for debugging HTTPS inspection issues?A . vpn debug cptls onB . fw ctl debug Cm fw + conn drop cptlsC . fw diag debug tls enableD . fw debug tls on TDERROR_ALL_ALL=5View AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk108202
In R80 spoofing is defined as a method of:
In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address TranslationB . Hiding your firewall from unauthorized usersC . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come an authorized...