Which port is used for this?

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265 B. TCP port 265 C. UDP port 256 D. TCP port 256View AnswerAnswer: B

November 13, 2022 No Comments READ MORE +

Using ClusterXL, what statement is true about the Sticky Decision Function?

Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementations B. All connections are processed and synchronized by the pivot C. Is configured using cpconfig D. Is only relevant when using SecureXLView AnswerAnswer: A

November 12, 2022 No Comments READ MORE +

What are the three main components of Check Point security management architecture?

What are the three main components of Check Point security management architecture?A . SmartConsole, Security Management, and Security Gateway B. Smart Console, Standalone, and Security Management C. SmartConsole, Security policy, and Logs & Monitoring D. GUI-Client, Security Management, and Security GatewayView AnswerAnswer: A

November 12, 2022 No Comments READ MORE +

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.A . On all satellite gateway to satellite gateway tunnels B. On specific tunnels for specific gateways C. On specific tunnels in the community D. On specific satellite...

November 11, 2022 No Comments READ MORE +

Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?

Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?A . SmartManager B. SmartConsole C. Security Gateway D. Security Management ServerView AnswerAnswer: D

November 11, 2022 No Comments READ MORE +

Security Zones do no work with what type of defined rule?

Security Zones do no work with what type of defined rule?A . Application Control rule B. Manual NAT rule C. IPS bypass rule D. Firewall ruleView AnswerAnswer: B Explanation: https://community.checkpoint.com/t5/Management/Workaround-for-manual-NAT-when-security-zones-are-used/td-p/9915

November 11, 2022 No Comments READ MORE +

What is the purpose of a Clean-up Rule?

What is the purpose of a Clean-up Rule?A . Clean-up Rules do not server any purpose. B. Provide a metric for determining unnecessary rules. C. To drop any traffic that is not explicitly allowed. D. Used to better optimize a policy.View AnswerAnswer: C Explanation: These are basic access control rules...

November 11, 2022 No Comments READ MORE +

From SecureXL perspective, what are the tree paths of traffic flow:

From SecureXL perspective, what are the tree paths of traffic flow:A . Initial Path; Medium Path; Accelerated Path B. Layer Path; Blade Path; Rule Path C. Firewall Path; Accept Path; Drop Path D. Firewall Path; Accelerated Path; Medium PathView AnswerAnswer: D

November 11, 2022 No Comments READ MORE +

Which of the following commands is used to verify license installation?

Which of the following commands is used to verify license installation?A . Cplic verify license B. Cplic print C. Cplic show D. Cplic licenseView AnswerAnswer: B

November 11, 2022 No Comments READ MORE +

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?A . RADIUS B. Check Point password C. Security questions D. SecurIDView AnswerAnswer: C

November 11, 2022 No Comments READ MORE +