A new license should be generated and installed in all of the following situations EXCEPT when ________ .
A new license should be generated and installed in all of the following situations EXCEPT when ________ .A . The license is attached to the wrong Security GatewayB . The existing license expiresC . The license is upgradedD . The IP address of the Security Management or Security Gateway has...
What does the “unknown” SIC status shown on SmartConsole mean?
What does the “unknown” SIC status shown on SmartConsole mean?A . The SMS can contact the Security Gateway but cannot establish Secure Internal Communication.B . SIC activation key requires a reset.C . The SIC activation key is not known by any administrator.D . There is no connection between the Security...
What are the three essential components of the Check Point Security Management Architecture?
What are the three essential components of the Check Point Security Management Architecture?A . SmartConsole, Security Management Server, Security GatewayB . SmartConsole, SmartUpdate, Security GatewayC . Security Management Server, Security Gateway, Command Line InterfaceD . WebUI, SmartConsole, Security GatewayView AnswerAnswer: A Explanation: Deployments Basic deployments: - Standalone deployment - Security...
With which command can you view the running configuration of Gaia Operating system.
With which command can you view the running configuration of Gaia Operating system.A . show conf-activeB . show configuration activeC . show configurationD . show running-configurationView AnswerAnswer: C
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?A . To satellites through center onlyB . To center onlyC . To center and to other satellites through centerD . To center, or through the center to other satellites, to internet and other VPN targetsView AnswerAnswer:...
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?A . UserCheckB . Active Directory QueryC . Account Unit QueryD . User Directory QueryView AnswerAnswer: B Explanation: AD Query extracts user and computer identity information from the Active Directory...
Each cluster has __________ interfaces.
Each cluster has __________ interfaces.A . FiveB . TwoC . ThreeD . FourView AnswerAnswer: C Explanation: Each cluster member has three interfaces: one external interface, one internal interface, and one for synchronization. Cluster member interfaces facing in each direction are connected via a switch, router, or VLAN switch. Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm
Which Check Point products protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections...
The __________ is used to obtain identification and security information about network users.
The __________ is used to obtain identification and security information about network users.A . User DirectoryB . User serverC . UserCheckD . User indexView AnswerAnswer: A Explanation: Reference: https://www.checkpoint.com/downloads/product-related/datasheets/DS_UserDirectorySWB.pdf
What is the order of NAT priorities?
What is the order of NAT priorities?A . Static NAT, IP pool NAT, hide NATB . IP pool NAT, static NAT, hide NATC . Static NAT, automatic NAT, hide NATD . Static NAT, hide NAT, IP pool NATView AnswerAnswer: A Explanation: The order of NAT priorities is: