Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.

Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A

December 23, 2019 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . AcceptB . DropC . NATD . NoneView AnswerAnswer: D

December 23, 2019 No Comments READ MORE +

Which command lists all tables in Gaia?

Which command lists all tables in Gaia?A . fw tab CtB . fw tab ClistC . fw-tab CsD . fw tab -1View AnswerAnswer: C Explanation: Reference: http://dl3.checkpoint.com/paid/c7/c76b823d81bab77e1e40ac086fa81411/CP_R77_versions_CLI_ReferenceGuide.pdf? HashKey=1538418170_96def40f213f24a8b273cc77b408dd3f&xtn=.pdf

December 23, 2019 No Comments READ MORE +

What is true about the IPS-Blade?

What is true about the IPS-Blade?A . In R80, IPS is managed by the Threat Prevention PolicyB . In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R80, IPS Exceptions cannot be attached to “all rules”D . In R80, the GeoPolicy...

December 22, 2019 No Comments READ MORE +

Which method below is NOT one of the ways to communicate using the Management API’s?

Which method below is NOT one of the ways to communicate using the Management API’s?A . Typing API commands using the “mgmt_cli” commandB . Typing API commands from a dialog box inside the SmartConsole GUI applicationC . Typing API commands using Gaia’s secure shell(clish)19+D . Sending API commands over an...

December 21, 2019 No Comments READ MORE +

In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?

In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?A . Big lB . Little oC . Little iD . Big OView AnswerAnswer: D

December 21, 2019 No Comments READ MORE +

Which of those hosts should you try to remediate first?

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....

December 20, 2019 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D

December 20, 2019 No Comments READ MORE +

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D Explanation: Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm? topic=documents/R80/CP_R80_SecMGMT/120712

December 20, 2019 No Comments READ MORE +

What API command can he use in the script to achieve the requirement?

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address>B . add hostname <New HostName> ip-address <ip address>C . set host name <New...

December 18, 2019 No Comments READ MORE +