Which of the following authentication methods ARE NOT used for Mobile Access?

Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D Explanation: Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm

March 1, 2020 No Comments READ MORE +

In R80.10, how do you manage your Mobile Access Policy?

In R80.10, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A

February 29, 2020 No Comments READ MORE +

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...

February 29, 2020 No Comments READ MORE +

What are the two modes of SNX?

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...

February 29, 2020 No Comments READ MORE +

Which statement is NOT TRUE about Delta synchronization?

Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161B . Using UDP Multicast or Broadcast on port 8116C . Quicker than Full syncD . Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm

February 29, 2020 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191B . 18190C . 8983D . 19009View AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture­overview.pdf

February 29, 2020 No Comments READ MORE +

What is not a component of Check Point SandBlast?

What is not a component of Check Point SandBlast?A . Threat EmulationB . Threat SimulatorC . Threat ExtractionD . Threat CloudView AnswerAnswer: B

February 28, 2020 No Comments READ MORE +

Which packet info is ignored with Session Rate Acceleration?

Which packet info is ignored with Session Rate Acceleration?A . source port rangesB . source ipC . source portD . same info from Packet Acceleration is usedView AnswerAnswer: C Explanation: Reference: http://trlj.blogspot.com/2015/10/check-point-acceleration.html

February 28, 2020 No Comments READ MORE +

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...

February 28, 2020 No Comments READ MORE +

Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.

Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C

February 27, 2020 No Comments READ MORE +