Which command can you use to verify the number of active concurrent connections?
Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B
In R81, how do you manage your Mobile Access Policy?
In R81, how do you manage your Mobile Access Policy?A . Through the Unified Policy B. Through the Mobile Console C. From SmartDashboard D. From the Dedicated Mobility TabView AnswerAnswer: A
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention Policy B. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. In R81, IPS Exceptions cannot be attached to “all rules” D. In R81, the GeoPolicy...
Which command is used to set the CCP protocol to Multicast?
Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicast B. cphaconf set_ccp multicast C. cphaconf set_ccp no_broadcast D. cphaprob set_ccp no_broadcastView AnswerAnswer: B
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C
What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect D. Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D
Which command would disable a Cluster Member permanently?
Which command would disable a Cluster Member permanently?A . clusterXL_admin down B. cphaprob_admin down C. clusterXL_admin down-p D. set clusterXL down-pView AnswerAnswer: C
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A
What command would you use to restore this backup?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backup B. import backup C. cp_merge D. migrate importView AnswerAnswer: D
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....