Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265 B. TCP port 265 C. UDP port 256 D. TCP port 256View AnswerAnswer: B
Using ClusterXL, what statement is true about the Sticky Decision Function?
Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementations B. All connections are processed and synchronized by the pivot C. Is configured using cpconfig D. Is only relevant when using SecureXLView AnswerAnswer: A
What are the three main components of Check Point security management architecture?
What are the three main components of Check Point security management architecture?A . SmartConsole, Security Management, and Security Gateway B. Smart Console, Standalone, and Security Management C. SmartConsole, Security policy, and Logs & Monitoring D. GUI-Client, Security Management, and Security GatewayView AnswerAnswer: A
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.A . On all satellite gateway to satellite gateway tunnels B. On specific tunnels for specific gateways C. On specific tunnels in the community D. On specific satellite...
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?A . SmartManager B. SmartConsole C. Security Gateway D. Security Management ServerView AnswerAnswer: D
Security Zones do no work with what type of defined rule?
Security Zones do no work with what type of defined rule?A . Application Control rule B. Manual NAT rule C. IPS bypass rule D. Firewall ruleView AnswerAnswer: B Explanation: https://community.checkpoint.com/t5/Management/Workaround-for-manual-NAT-when-security-zones-are-used/td-p/9915
What is the purpose of a Clean-up Rule?
What is the purpose of a Clean-up Rule?A . Clean-up Rules do not server any purpose. B. Provide a metric for determining unnecessary rules. C. To drop any traffic that is not explicitly allowed. D. Used to better optimize a policy.View AnswerAnswer: C Explanation: These are basic access control rules...
From SecureXL perspective, what are the tree paths of traffic flow:
From SecureXL perspective, what are the tree paths of traffic flow:A . Initial Path; Medium Path; Accelerated Path B. Layer Path; Blade Path; Rule Path C. Firewall Path; Accept Path; Drop Path D. Firewall Path; Accelerated Path; Medium PathView AnswerAnswer: D
Which of the following commands is used to verify license installation?
Which of the following commands is used to verify license installation?A . Cplic verify license B. Cplic print C. Cplic show D. Cplic licenseView AnswerAnswer: B
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?A . RADIUS B. Check Point password C. Security questions D. SecurIDView AnswerAnswer: C