Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.
Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A
Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . AcceptB . DropC . NATD . NoneView AnswerAnswer: D
Which command lists all tables in Gaia?
Which command lists all tables in Gaia?A . fw tab CtB . fw tab ClistC . fw-tab CsD . fw tab -1View AnswerAnswer: C Explanation: Reference: http://dl3.checkpoint.com/paid/c7/c76b823d81bab77e1e40ac086fa81411/CP_R77_versions_CLI_ReferenceGuide.pdf? HashKey=1538418170_96def40f213f24a8b273cc77b408dd3f&xtn=.pdf
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R80, IPS is managed by the Threat Prevention PolicyB . In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R80, IPS Exceptions cannot be attached to “all rules”D . In R80, the GeoPolicy...
Which method below is NOT one of the ways to communicate using the Management API’s?
Which method below is NOT one of the ways to communicate using the Management API’s?A . Typing API commands using the “mgmt_cli” commandB . Typing API commands from a dialog box inside the SmartConsole GUI applicationC . Typing API commands using Gaia’s secure shell(clish)19+D . Sending API commands over an...
In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?
In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?A . Big lB . Little oC . Little iD . Big OView AnswerAnswer: D
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....
What command would you use to restore this backup?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D Explanation: Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm? topic=documents/R80/CP_R80_SecMGMT/120712
What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address>B . add hostname <New HostName> ip-address <ip address>C . set host name <New...