In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstatB . fw ctl affinity Cl Ca Cr CvC . fw ctl multik statD . cpinfoView AnswerAnswer: B
How many policy layers do Access Control policy support?
How many policy layers do Access Control policy support?A . 2B . 4C . 1D . 3View AnswerAnswer: A Explanation: Two policy layers: - Network Policy Layer - Application Control Policy Layer
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?A . PentagonB . CombinedC . MeshedD . StarView AnswerAnswer: D
Check Point security components are divided into the following components:
Check Point security components are divided into the following components:A . GUI Client, Security Gateway, WebUI InterfaceB . GUI Client, Security Management, Security GatewayC . Security Gateway, WebUI Interface, Consolidated Security LogsD . Security Management, Security Gateway, Consolidate Security LogsView AnswerAnswer: B
How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) imagesB . images are chosen by administrator during installationC . as many as licensed forD . the most new imageView AnswerAnswer: A
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.A . Accept; redirectB . Accept; dropC . Redirect; dropD . Drop; acceptView AnswerAnswer: D
Which Remote Access Client does not provide an Office-Mode Address?
Which Remote Access Client does not provide an Office-Mode Address?A . SecuRemoteB . Endpoint Security SuiteC . Endpoint Security VPND . Check Point MobileView AnswerAnswer: A
How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?
How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?A . By dropping traffic from websites identified through ThreatCloud Verification and URL CachingB . By dropping traffic that is not proven to be from clean websites in the URL Filtering bladeC . By allowing traffic...
On the following picture an administrator configures Identity Awareness:
On the following picture an administrator configures Identity Awareness: After clicking “Next” the above configuration is supported by:A . Kerberos SSO which will be working for Active Directory integrationB . Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses...
As a last resort, to restore traffic flow, what command would you run to remove the latest policy from GW-3?
You have pushed policy to GW-3 and now cannot pass traffic through the gateway. As a last resort, to restore traffic flow, what command would you run to remove the latest policy from GW-3?A . fw unloadlocalB . fw unloadpolicyC . fwm unload localD . fwm unload policyView AnswerAnswer: A