Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful ModeB . VPN Routing ModeC . Wire ModeD . Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...
What are the different command sources that allow you to communicate with the API server?
What are the different command sources that allow you to communicate with the API server?A . SmartView Monitor, API_cli Tool, Gaia CLI, Web ServicesB . SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web ServicesC . SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web ServicesD . API_cli Tool, Gaia CLI, Web...
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway /Cluster Members over Check Point SIC _____________ .
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway /Cluster Members over Check Point SIC _____________ .A . TCP Port 18190B . TCP Port 18209C . TCP Port 19009D . TCP Port 18191View AnswerAnswer: D
Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.
Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A
In R80 spoofing is defined as a method of:
In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...
How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) imagesB . images are chosen by administrator during installationC . as many as licensed forD . the most new imageView AnswerAnswer: A
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703.htm
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...