From SecureXL perspective, what are the tree paths of traffic flow:
From SecureXL perspective, what are the tree paths of traffic flow:A . Initial Path; Medium Path; Accelerated PathB . Layer Path; Blade Path; Rule PathC . Firewall Path; Accept Path; Drop PathD . Firewall Path; Accelerated Path; Medium PathView AnswerAnswer: D Explanation: The correct answer is D because from SecureXL...
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sidB . Accept-CharsetC . Proxy-AuthorizationD . ApplicationView AnswerAnswer: A Explanation: The correct answer is A because session unique identifiers are passed to the web api using the X-chkp-sid http header option1. The X-chkp-sid header is...
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.A . fw ctl set int fwha vmac global param enabledB . fw ctl get int fwha vmac global param enabled; result of command should return value 1C . cphaprob...
What is presented on it?
You can see the following graphic: What is presented on it? A. Properties of personal. p12 certificate file issued for user John. B. Shared secret properties of John’s password. C. VPN certificate properties of the John’s gateway. D. Expired. p12 certificate properties for user John.View AnswerAnswer: A Explanation: The answer...
What is the SOLR database for?
What is the SOLR database for?A . Used for full text search and enables powerful matching capabilitiesB . Writes data to the database and full text searchC . Serves GUI responsible to transfer request to the DLE serverD . Enables powerful matching capabilities and writes data to the databaseView AnswerAnswer:...
How would you determine the software version from the CLI?
How would you determine the software version from the CLI?A . fw verB . fw statC . fw monitorD . cpinfoView AnswerAnswer: A Explanation: The command that can be used to determine the software version from the CLI is fw ver. This command displays the version of the firewall module...
Which of the following is the most secure means of authentication?
Which of the following is the most secure means of authentication?A . PasswordB . CertificateC . TokenD . Pre-shared secretView AnswerAnswer: B Explanation: Certificate is the most secure means of authentication among the given options2. A certificate is a digital document that contains information about the identity of a user...
Choose what BEST describes the reason why querying logs now is very fast.
Choose what BEST describes the reason why querying logs now is very fast.A . New Smart-1 appliances double the physical memory installB . Indexing Engine indexes logs for faster search resultsC . SmartConsole now queries results directly from the Security GatewayD . The amount of logs been store is less...
Which two Identity Awareness commands are used to support identity sharing?
Which two Identity Awareness commands are used to support identity sharing?A . Policy Decision Point (PDP) and Policy Enforcement Point (PEP)B . Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)C . Policy Manipulation Point (PMP) and Policy Activation Point (PAP)D . Policy Activation Point (PAP) and Policy Decision Point...
What will happen to the changes already made?
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?A . Tom will have to reboot his SmartConsole computer, clear the...