Browser-based Authentication sends users to a web page to acquire identities using ________ .
Browser-based Authentication sends users to a web page to acquire identities using ________ .A . User DirectoryB . Captive Portal and Transparent Kerberos AuthenticationC . Captive PortalD . UserCheckView AnswerAnswer: B Explanation: To enable Identity Awareness:
In R80 spoofing is defined as a method of:
In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . EditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: To create a new permission profile:
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.A . /var/log/Cpbackup/backups/backup/backup_fw.tgsB . /var/log/Cpbackup/backups/backup/backup_fw.tarC . /var/log/Cpbackup/backups/backups/backup_fw.tarD . /var/log/Cpbackup/backups/backup_fw.tgzView AnswerAnswer: D Explanation: Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security Management server database, or...
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license storedA . Security GatewayB . Check Point user centerC . Security Management ServerD . SmartConsole installed deviceView AnswerAnswer: C Explanation: SmartUpdate installs two repositories on the Security Management server: - License & Contract...
In R80, Unified Policy is a combination of
In R80, Unified Policy is a combination ofA . Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.B . Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.C . Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat...
What is the order of NAT priorities?
What is the order of NAT priorities?A . Static NAT, IP pool NAT, hide NATB . IP pool NAT, static NAT, hide NATC . Static NAT, automatic NAT, hide NATD . Static NAT, hide NAT, IP pool NATView AnswerAnswer: A Explanation: The order of NAT priorities is:
Choose what BEST describes the Policy Layer Traffic Inspection.
Choose what BEST describes the Policy Layer Traffic Inspection.A . If a packet does not match any of the inline layers, the matching continues to the next Layer.B . If a packet matches an inline layer, it will continue matching the next layer.C . If a packet does not match...
What can we infer about the recent changes made to the Rule Base?
Examine the following Rule Base. What can we infer about the recent changes made to the Rule Base?A . Rule 7 was created by the 'admin' administrator in the current sessionB . 8 changes have been made by administrators since the last policy installationC . Te rules 1, 5 and...
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.A . High AvailabilityB . Load Sharing MulticastC . Load Sharing PivotD . Master/BackupView AnswerAnswer: B Explanation: ClusterXL uses the Multicast mechanism to associate the virtual cluster IP addresses with all cluster members. By binding...