What is considered part of the zone?

A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?A . The zone is based on the network topology and determined according to where the interface leads to.B . Security Zones are not supported by Check...

January 15, 2024 No Comments READ MORE +

What is the best upgrade method when the management server is not connected to the Internet?

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?A . Export R80 configuration, clean install R80.10 and import the configurationB . CPUSE online upgradeC . CPUSE offline upgradeD . SmartUpdate upgradeView AnswerAnswer: C

January 15, 2024 No Comments READ MORE +

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security GatewayA . True, CLI is the prefer method for LicensingB . False, Central License are handled via Security Management ServerC . False, Central License are installed via Gaia on Security GatewaysD ....

January 15, 2024 No Comments READ MORE +

Name the authentication method that requires token authenticator.

Name the authentication method that requires token authenticator.A . SecureIDB . RadiusC . DynamicIDD . TACACSView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManag ement_AdminGuide/Topics-SECMG/Configuring-SecurID-Authentication.htm

January 15, 2024 No Comments READ MORE +

A SAM rule Is implemented to provide what function or benefit?

A SAM rule Is implemented to provide what function or benefit?A . Allow security audits.B . Handle traffic as defined in the policy.C . Monitor sequence activity.D . Block suspicious activity.View AnswerAnswer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMo nitoring_AdminGuide/Topics-LMG/Monitoring-Suspicious-Activity-Rules.htm

January 15, 2024 No Comments READ MORE +

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?A . Publish changesB . Save changesC . Install policyD . Install databaseView AnswerAnswer: C

January 15, 2024 No Comments READ MORE +

Which of the following commands is used to monitor cluster members?

Which of the following commands is used to monitor cluster members?A . cphaprob stateB . cphaprob statusC . cphaprobD . cluster stateView AnswerAnswer: A

January 15, 2024 No Comments READ MORE +

Which of the following is used to enforce changes made to a Rule Base?

Which of the following is used to enforce changes made to a Rule Base?A . Publish databaseB . Save changesC . Install policyD . Activate policyView AnswerAnswer: A

January 15, 2024 No Comments READ MORE +

What is true about the IPS-Blade?

What is true about the IPS-Blade?A . in R80, IPS is managed by the Threat Prevention PolicyB . in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . in R80, IPS Exceptions cannot be attached to “all rules”D . in R80, the GeoPolicy...

January 14, 2024 No Comments READ MORE +

What is the Transport layer of the TCP/IP model responsible for?

What is the Transport layer of the TCP/IP model responsible for?A . It transports packets as datagrams along different routes to reach their destination.B . It manages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application.C . It...

January 14, 2024 No Comments READ MORE +