Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is NOT used for identifying connection?
Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is NOT used for identifying connection?A . Source AddressB . Destination AddressC . TCP Acknowledgment NumberD . Source PortView AnswerAnswer: C Explanation: https //sc1.checkpoint.com/documents/R77/CP R77_Firewall_WebAdmm/92711.htm
SandBlast agent extends 0 day prevention to what part of the network?
SandBlast agent extends 0 day prevention to what part of the network?A . Web Browsers and user devicesB . DMZ serverC . CloudD . Email serversView AnswerAnswer: A
In what way are SSL VPN and IPSec VPN different?
In what way are SSL VPN and IPSec VPN different?A . SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientlessB . SSL VPN adds an extra VPN header to the packet, IPSec VPN does notC . IPSec VPN does not support two factor authentication, SSL...
What solution is Multi-queue intended to provide?
What solution is Multi-queue intended to provide?A . Improve the efficiency of traffic handling by SecureXL SNDsB . Reduce the confusion for traffic capturing in FW MonitorC . Improve the efficiency of CoreXL Kernel InstancesD . Reduce the performance of network interfacesView AnswerAnswer: C
Which software blade does NOT accompany the Threat Prevention policy?
Which software blade does NOT accompany the Threat Prevention policy?A . Anti-virusB . IPSC . Threat EmulationD . Application Control and URL FilteringView AnswerAnswer: D
Post-Automatic/Manual NAT rules
Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A
What is not a purpose of the deployment of Check Point API?
What is not a purpose of the deployment of Check Point API?A . Execute an automated script to perform common tasksB . Create a customized GUI Client for manipulating the objects databaseC . Create products that use and enhance the Check Point solutionD . Integrate Check Point products with 3rd...
Which statement is correct about the Sticky Decision Function?
Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator cardB . Does not support SPI’s when configured for Load SharingC . It is automatically disabled if the Mobile Access Software Blade is enabled on the...
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sidB . Accept-CharsetC . Proxy-AuthorizationD . ApplicationView AnswerAnswer: C
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.A . Accept; redirectB . Accept; dropC . Redirect; dropD . Drop; acceptView AnswerAnswer: D