Which tool is used to enable cluster membership on a Gateway?
Which tool is used to enable cluster membership on a Gateway?A . SmartUpdateB . cpconfigC . SmartConsoleD . sysconfigView AnswerAnswer: B
Which of the following is NOT a component of a Distinguished Name?
Which of the following is NOT a component of a Distinguished Name?A . Common NameB . CountryC . User containerD . Organizational UnitView AnswerAnswer: C
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.A . Upgrade the software versionB . Open WebUIC . Open SSHD . Open service request with Check Point Technical SupportView AnswerAnswer: A
Which of the following options can you add to each Log, Detailed Log and Extended Log?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?A . AccountingB . SuppressionC . Accounting/SuppressionD . Accounting/ExtendedView AnswerAnswer: C
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:A . Rename the hostname of the...
Using ClusterXL, what statement is true about the Sticky Decision Function?
Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementationsB . All connections are processed and synchronized by the pivotC . Is configured using cpconfigD . Is only relevant when using SecureXLView AnswerAnswer: A
Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?A . AD QueryB . Browser-Based AuthenticationC . Identity AgentsD...
When an encrypted packet is decrypted, where does this happen?
When an encrypted packet is decrypted, where does this happen?A . Security policyB . Inbound chainC . Outbound chainD . Decryption is not supportedView AnswerAnswer: B
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?A . FullB . CustomC . CompleteD . LightView AnswerAnswer: A
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?A . SND is a feature to accelerate multiple SSL VPN connectionsB . SND is an alternative to IPSec Main Mode, using only 3 packetsC . SND is used to distribute packets among Firewall instancesD ....