What is the default shell for the command line interface?
What is the default shell for the command line interface?A . Clish B. Admin C. Normal D. ExpertView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminG uide/Topics-GAG/Gaia-Clish-Commands.htm
What is the difference between SSL VPN and IPSec VPN?
What is the difference between SSL VPN and IPSec VPN?A . IPSec VPN does not require installation of a resident VPN client B. SSL VPN requires installation of a resident VPN client C. SSL VPN and IPSec VPN are the same D. IPSec VPN requires installation of a resident VPN...
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?A . Application Control B. Data Awareness C. Identity Awareness D. Threat EmulationView AnswerAnswer: A
Which of the following is NOT an advantage to using multiple LDAP servers?
Which of the following is NOT an advantage to using multiple LDAP servers?A . You achieve a faster access time by placing LDAP servers containing the database at remote sites B. You achieve compartmentalization by allowing a large number of users to be distributed across several servers C. Information on...
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?A . host name myHost12 ip-address 10.50.23.90 B. mgmt add host name ip-address 10.50.23.90 C. add host name emailserver1 ip-address 10.50.23.90 D. mgmt add host name emailserver1 ip-address 10.50.23.90View AnswerAnswer: D
When an encrypted packet is decrypted, where does this happen?
When an encrypted packet is decrypted, where does this happen?A . Security policy B. Inbound chain C. Outbound chain D. Decryption is not supportedView AnswerAnswer: A
Using ClusterXL, what statement is true about the Sticky Decision Function?
Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementations B. All connections are processed and synchronized by the pivot C. Is configured using cpconfig D. Is only relevant when using SecureXLView AnswerAnswer: A
Which of the following options can you add to each Log, Detailed Log and Extended Log?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?A . Accounting B. Suppression C. Accounting/Suppression D. Accounting/ExtendedView AnswerAnswer: C
Which of the following commands is used to monitor cluster members?
Which of the following commands is used to monitor cluster members?A . cphaprob state B. cphaprob status C. cphaprob D. cluster stateView AnswerAnswer: A
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?A . Windows Management Instrumentation (WMI) B. Hypertext Transfer Protocol Secure (HTTPS) C. Lightweight Directory Access Protocol (LDAP) D. Remote Desktop Protocol (RDP)View AnswerAnswer: C Explanation: AD Query (ADQ) is a clientless identity acquisition method...