In the Check Point Security Management Architecture, which component(s) can store logs?
In the Check Point Security Management Architecture, which component(s) can store logs?A . SmartConsoleB . Security Management Server and Security GatewayC . Security Management ServerD . SmartConsole and Security Management ServerView AnswerAnswer: B Explanation: The Security Management Server and the Security Gateway are the components that can store logs in...
What is the difference between SSL VPN and IPSec VPN?
What is the difference between SSL VPN and IPSec VPN?A . IPSec VPN does not require installation of a resident VPN clientB . SSL VPN requires installation of a resident VPN clientC . SSL VPN and IPSec VPN are the sameD . IPSec VPN requires installation of a resident VPN...
What is a reason for manual creation of a NAT rule?
What is a reason for manual creation of a NAT rule?A . In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules.B . Network Address Translation of RFC1918-compliant networks is needed to access the Internet.C . Network Address Translation is desired for...
Which firewall daemon is responsible for the FW CLI commands?
Which firewall daemon is responsible for the FW CLI commands?A . fwdB . fwmC . cpmD . cpdView AnswerAnswer: A Explanation: The correct answer is A because the fwd daemon is responsible for the FW CLI commands3. The fwm daemon handles the communication between the Security Management server and the...
When an encrypted packet is decrypted, where does this happen?
When an encrypted packet is decrypted, where does this happen?A . Security policyB . Inbound chainC . Outbound chainD . Decryption is not supportedView AnswerAnswer: A Explanation: When an encrypted packet is decrypted, this happens in the security policy4. The security policy is a set of rules that defines how...
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?A . Save PolicyB . Install DatabaseC . Save sessionD . Install PolicyView AnswerAnswer: A Explanation: The method to update the trusted log server regarding...
R80.10 management server can manage gateways with which versions installed?
R80.10 management server can manage gateways with which versions installed?A . Versions R77 and higherB . Versions R76 and higherC . Versions R75.20 and higherD . Version R75 and higherView AnswerAnswer: B Explanation: The R80.10 management server can manage gateways with versions R76 and higher34. Versions lower than R76 are...
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?A . AES-GCM-256B . AES-CBC-256C . AES-GCM-128View AnswerAnswer: B Explanation: The answer is B because AES-CBC-256 is not a supported encryption algorithm for IPsec Security Associations (Phase 2) in R81. The supported encryption algorithms...
Fill in the blank: An LDAP server holds one or more ______________.
Fill in the blank: An LDAP server holds one or more ______________.A . Server UnitsB . Administrator UnitsC . Account UnitsD . Account ServersView AnswerAnswer: C Explanation: An LDAP server holds one or more Account Units. An Account Unit is a logical representation of an LDAP server in the Check...
What command would you use to restore this backup?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: A Explanation: The command to restore a backup of Check Point configurations without the OS information is...