Browser-based Authentication sends users to a web page to acquire identities using ________ .

Browser-based Authentication sends users to a web page to acquire identities using ________ .A . User DirectoryB . Captive Portal and Transparent Kerberos AuthenticationC . Captive PortalD . UserCheckView AnswerAnswer: B Explanation: To enable Identity Awareness:

July 3, 2020 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...

July 3, 2020 No Comments READ MORE +

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . EditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: To create a new permission profile:

July 2, 2020 No Comments READ MORE +

Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.

Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.A . /var/log/Cpbackup/backups/backup/backup_fw.tgsB . /var/log/Cpbackup/backups/backup/backup_fw.tarC . /var/log/Cpbackup/backups/backups/backup_fw.tarD . /var/log/Cpbackup/backups/backup_fw.tgzView AnswerAnswer: D Explanation: Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security Management server database, or...

July 2, 2020 No Comments READ MORE +

When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored

When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license storedA . Security GatewayB . Check Point user centerC . Security Management ServerD . SmartConsole installed deviceView AnswerAnswer: C Explanation: SmartUpdate installs two repositories on the Security Management server: - License & Contract...

July 2, 2020 No Comments READ MORE +

In R80, Unified Policy is a combination of

In R80, Unified Policy is a combination ofA . Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.B . Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.C . Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat...

July 2, 2020 No Comments READ MORE +

What is the order of NAT priorities?

What is the order of NAT priorities?A . Static NAT, IP pool NAT, hide NATB . IP pool NAT, static NAT, hide NATC . Static NAT, automatic NAT, hide NATD . Static NAT, hide NAT, IP pool NATView AnswerAnswer: A Explanation: The order of NAT priorities is:

July 2, 2020 No Comments READ MORE +

Choose what BEST describes the Policy Layer Traffic Inspection.

Choose what BEST describes the Policy Layer Traffic Inspection.A . If a packet does not match any of the inline layers, the matching continues to the next Layer.B . If a packet matches an inline layer, it will continue matching the next layer.C . If a packet does not match...

July 2, 2020 No Comments READ MORE +

What can we infer about the recent changes made to the Rule Base?

Examine the following Rule Base. What can we infer about the recent changes made to the Rule Base?A . Rule 7 was created by the 'admin' administrator in the current sessionB . 8 changes have been made by administrators since the last policy installationC . Te rules 1, 5 and...

July 2, 2020 No Comments READ MORE +

Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.

Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.A . High AvailabilityB . Load Sharing MulticastC . Load Sharing PivotD . Master/BackupView AnswerAnswer: B Explanation: ClusterXL uses the Multicast mechanism to associate the virtual cluster IP addresses with all cluster members. By binding...

July 2, 2020 No Comments READ MORE +