Which command can you use to verify the number of active concurrent connections?

Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B

August 22, 2023 No Comments READ MORE +

In R81, how do you manage your Mobile Access Policy?

In R81, how do you manage your Mobile Access Policy?A . Through the Unified Policy B. Through the Mobile Console C. From SmartDashboard D. From the Dedicated Mobility TabView AnswerAnswer: A

August 21, 2023 No Comments READ MORE +

What is true about the IPS-Blade?

What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention Policy B. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. In R81, IPS Exceptions cannot be attached to “all rules” D. In R81, the GeoPolicy...

August 21, 2023 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicast B. cphaconf set_ccp multicast C. cphaconf set_ccp no_broadcast D. cphaprob set_ccp no_broadcastView AnswerAnswer: B

August 21, 2023 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C

August 21, 2023 No Comments READ MORE +

What are the three components for Check Point Capsule?

What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect D. Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D

August 20, 2023 No Comments READ MORE +

Which command would disable a Cluster Member permanently?

Which command would disable a Cluster Member permanently?A . clusterXL_admin down B. cphaprob_admin down C. clusterXL_admin down-p D. set clusterXL down-pView AnswerAnswer: C

August 19, 2023 No Comments READ MORE +

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A

August 19, 2023 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backup B. import backup C. cp_merge D. migrate importView AnswerAnswer: D

August 19, 2023 No Comments READ MORE +

Which component is NOT part of the SandBlast Mobile solution?

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....

August 19, 2023 No Comments READ MORE +