How would you determine the software version from the CLI?
How would you determine the software version from the CLI?A . fw ver B. fw stat C. fw monitor D. cpinfoView AnswerAnswer: A
Log query results can be exported to what file format?
Log query results can be exported to what file format?A . Word Document (docx) B. Comma Separated Value (csv) C. Portable Document Format (pdf) D. Text (txt)View AnswerAnswer: B
Which of the following is an authentication method used for Identity Awareness?
Which of the following is an authentication method used for Identity Awareness?A . SSL B. Captive Portal C. PKI D. RSAView AnswerAnswer: B
What Check Point technologies deny or permit network traffic?
What Check Point technologies deny or permit network traffic?A . Application Control, DLP B. Packet Filtering, Stateful Inspection, Application Layer Firewall. C. ACL, SandBlast, MPT D. IPS, Mobile Threat ProtectionView AnswerAnswer: B
Which of the following are types of VPN communities?
Which of the following are types of VPN communities?A . Pentagon, star, and combination B. Star, octagon, and combination C. Combined and star D. Meshed, star, and combinationView AnswerAnswer: D
Which of the following is considered to be the more secure and preferred VPN authentication method?
Which of the following is considered to be the more secure and preferred VPN authentication method?A . Password B. Certificate C. MD5 D. Pre-shared secretView AnswerAnswer: B
Name the authentication method that requires token authenticator.
Name the authentication method that requires token authenticator.A . SecureID B. Radius C. DynamicID D. TACACSView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManag ement_AdminGuide/Topics-SECMG/Configuring-SecurID-Authentication.htm
Fill in the blank Once a license is activated, a___________should be installed.
Fill in the blank Once a license is activated, a___________should be installed.A . Security Gateway Contract file B. Service Contract file C. License Management file D. License Contract fileView AnswerAnswer: B
Is it possible to have more than one administrator connected to a Security Management Server at once?
Is it possible to have more than one administrator connected to a Security Management Server at once?A . Yes, but only if all connected administrators connect with read-only permissions. B. Yes, but objects edited by one administrator will be locked for editing by others until the session is published. C....
Which tool is used to enable ClusterXL?
Which tool is used to enable ClusterXL?A . SmartUpdate B. cpconfig C. SmartConsole D. sysconfigView AnswerAnswer: B