Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?A . Windows Management Instrumentation (WMI)B . Hypertext Transfer Protocol Secure (HTTPS)C . Lightweight Directory Access Protocol (LDAP)D . Remote Desktop Protocol (RDP)View AnswerAnswer: C Explanation: AD Query (ADQ) is a clientless identity acquisition method...

January 17, 2024 No Comments READ MORE +

When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?

When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?A . SmartConsole installed deviceB . Check Point user centerC . Security Management ServerD . Security GatewayView AnswerAnswer: C

January 17, 2024 No Comments READ MORE +

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?A . Verification toolB . Verification licensingC . Automatic licensingD . Automatic licensing and Verification toolView AnswerAnswer: D

January 17, 2024 No Comments READ MORE +

Which of the following are types of VPN communities?

Which of the following are types of VPN communities?A . Pentagon, star, and combinationB . Star, octagon, and combinationC . Combined and starD . Meshed, star, and combinationView AnswerAnswer: D

January 17, 2024 No Comments READ MORE +

When should you generate new licenses?

When should you generate new licenses?A . Before installing contract files.B . After an RMA procedure when the MAC address or serial number of the appliance changes.C . When the existing license expires, license is upgraded or the IP-address where the license is tied changes.D . Only when the license...

January 17, 2024 No Comments READ MORE +

In SmartEvent, a correlation unit (CU) is used to do what?

In SmartEvent, a correlation unit (CU) is used to do what?A . Collect security gateway logs, Index the logs and then compress the logs.B . Receive firewall and other software blade logs in a region and forward them to the primary log server.C . Analyze log entries and identify events.D...

January 16, 2024 No Comments READ MORE +

Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?

The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?A . No, it will not work independently. Hit Count will be shown only for...

January 16, 2024 No Comments READ MORE +

Which software blade does NOT accompany the Threat Prevention policy?

Which software blade does NOT accompany the Threat Prevention policy?A . IPSB . Application Control and URL FilteringC . Threat EmulationD . Anti-virusView AnswerAnswer: B

January 16, 2024 No Comments READ MORE +

Which of the following is an authentication method used for Identity Awareness?

Which of the following is an authentication method used for Identity Awareness?A . SSLB . Captive PortalC . PKID . RSAView AnswerAnswer: B

January 16, 2024 No Comments READ MORE +

Secure Internal Communication (SIC) is handled by what process?

Secure Internal Communication (SIC) is handled by what process?A . CPMB . HTTPSC . FWDD . CPDView AnswerAnswer: D Explanation: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolution details=&solutionid=sk97638

January 16, 2024 No Comments READ MORE +