What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule ConnectB . Capsule Workspace, Capsule Cloud, Capsule ConnectC . Capsule Workspace, Capsule Docs, Capsule ConnectD . Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D Explanation: The three components for Check Point Capsule are Capsule Workspace,...
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.A . AES-128B . AES-256C . DESD . 3DESView AnswerAnswer: A Explanation: In Security Gateways R75 and above, SIC uses AES-128 for encryption. SIC stands for Secure Internal Communication, which is a mechanism that establishes trust...
What protocol is specifically used for clustered environments?
What protocol is specifically used for clustered environments?A . Clustered ProtocolB . Synchronized Cluster ProtocolC . Control Cluster ProtocolD . Cluster Control ProtocolView AnswerAnswer: D Explanation: The protocol that is specifically used for clustered environments is Cluster Control Protocol (CCP). CCP is a proprietary Check Point protocol that is used...
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
After installation, is the administrator required to perform any additional tasks?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?A . Go to clash-Run cpstop | Run cpstartB . Go to clash-Run cpconfig...
Which method below is NOT one of the ways to communicate using the Management API’s?
Which method below is NOT one of the ways to communicate using the Management API’s?A . Typing API commands using the “mgmt_cli” commandB . Typing API commands from a dialog box inside the SmartConsole GUI applicationC . Typing API commands using Gaia’s secure shell (clash)19+D . Sending API commands over...
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: B Explanation: The Sticky Decision Function (SDF) is required to prevent failovers in an Active-Active cluster. The SDF ensures that...
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?A . The firewall topologiesB . NAT RulesC . The Rule BaseD . The VPN DomainsView AnswerAnswer: D Explanation: The VPN Domains configuration element determines which traffic should be encrypted into a VPN...
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.A . DLP shared policyB . Geo policy shared policyC . Mobile Access software bladeD . HTTPS inspectionView AnswerAnswer: B Explanation: The answer is B because Geo policy shared policy is used to...
Fill in the blank: In order to install a license, it must first be added to the ____________.
Fill in the blank: In order to install a license, it must first be added to the ____________.A . User CenterB . Package repositoryC . Download Center Web siteD . License and Contract repositoryView AnswerAnswer: D Explanation: In order to install a license, it must first be added to the...