What is considered part of the zone?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?A . The zone is based on the network topology and determined according to where the interface leads to.B . Security Zones are not supported by Check...
What is the best upgrade method when the management server is not connected to the Internet?
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?A . Export R80 configuration, clean install R80.10 and import the configurationB . CPUSE online upgradeC . CPUSE offline upgradeD . SmartUpdate upgradeView AnswerAnswer: C
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security GatewayA . True, CLI is the prefer method for LicensingB . False, Central License are handled via Security Management ServerC . False, Central License are installed via Gaia on Security GatewaysD ....
Name the authentication method that requires token authenticator.
Name the authentication method that requires token authenticator.A . SecureIDB . RadiusC . DynamicIDD . TACACSView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManag ement_AdminGuide/Topics-SECMG/Configuring-SecurID-Authentication.htm
A SAM rule Is implemented to provide what function or benefit?
A SAM rule Is implemented to provide what function or benefit?A . Allow security audits.B . Handle traffic as defined in the policy.C . Monitor sequence activity.D . Block suspicious activity.View AnswerAnswer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMo nitoring_AdminGuide/Topics-LMG/Monitoring-Suspicious-Activity-Rules.htm
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?A . Publish changesB . Save changesC . Install policyD . Install databaseView AnswerAnswer: C
Which of the following commands is used to monitor cluster members?
Which of the following commands is used to monitor cluster members?A . cphaprob stateB . cphaprob statusC . cphaprobD . cluster stateView AnswerAnswer: A
Which of the following is used to enforce changes made to a Rule Base?
Which of the following is used to enforce changes made to a Rule Base?A . Publish databaseB . Save changesC . Install policyD . Activate policyView AnswerAnswer: A
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . in R80, IPS is managed by the Threat Prevention PolicyB . in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . in R80, IPS Exceptions cannot be attached to “all rules”D . in R80, the GeoPolicy...
What is the Transport layer of the TCP/IP model responsible for?
What is the Transport layer of the TCP/IP model responsible for?A . It transports packets as datagrams along different routes to reach their destination.B . It manages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application.C . It...