Which of the following statements is TRUE about R80 management plug-ins?

Which of the following statements is TRUE about R80 management plug-ins?A . The plug-in is a package installed on the Security Gateway.B . Installing a management plug-in requires a Snapshot, just like any upgrade process.C . A management plug-in interacts with a Security Management Server to provide new features and...

July 2, 2020 No Comments READ MORE +

Which feature is NOT provided by all Check Point Mobile Access solutions?

Which feature is NOT provided by all Check Point Mobile Access solutions?A . Support for IPv6B . Granular access controlC . Strong user authenticationD . Secure connectivityView AnswerAnswer: A Explanation: Types of Solutions All of Check Point's Remote Access solutions provide: - Enterprise-grade, secure connectivity to corporate resources. - Strong...

July 2, 2020 No Comments READ MORE +

How will you describe the new “Publish” button in R80 Management Console?

You are the senior Firewall administrator for ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house overview of the new features of Check Point R80 Management to the other administrators in ABC Corp. How will you...

July 2, 2020 No Comments READ MORE +

Which of the following is NOT a component of a Distinguished Name?

Which of the following is NOT a component of a Distinguished Name?A . Organizational UnitB . CountryC . Common NameD . User containerView AnswerAnswer: D Explanation: Distinguished Name Components CN=common name, OU=organizational unit, O=organization, L=locality, ST=state or province, C=country name Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950

July 1, 2020 No Comments READ MORE +

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . EditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: To create a new permission profile:

July 1, 2020 No Comments READ MORE +

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?A . Machine Hide NATB . Address Range Hide NATC . Network Hide NATD . Machine Static NATView AnswerAnswer: BC Explanation: SmartDashboard organizes the automatic NAT rules in this order:

July 1, 2020 No Comments READ MORE +

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?A . Machine Hide NATB . Address Range Hide NATC . Network Hide NATD . Machine Static NATView AnswerAnswer: BC Explanation: SmartDashboard organizes the automatic NAT rules in this order:

July 1, 2020 No Comments READ MORE +

By default, which port does the WebUI listen on?

By default, which port does the WebUI listen on? B. 4434 C. 443 D. 8080View AnswerAnswer: C Explanation: To configure Security Management Server on Gaia: - Open a browser to the WebUI: https://<Gaia management IP address> Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=documents/R80/CP_R80_Gaia_IUG/132120

July 1, 2020 No Comments READ MORE +

The following graphic shows:

The following graphic shows: A . View from SmartLog for logs initiated from source address 10.1.1.202B . View from SmartView Tracker for logs of destination address 10.1.1.202C . View from SmartView Tracker for logs initiated from source address 10.1.1.202D . View from SmartView Monitor for logs initiated from source address...

July 1, 2020 No Comments READ MORE +

Which command should he use in CLI?

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server Operating System. He can do this via WebUI or via CLI. Which command should he use in CLI?A . remove database lockB . The database feature has one command: lock database override.C . override database...

July 1, 2020 No Comments READ MORE +