Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
What has to be taken into consideration when configuring Management HA?
What has to be taken into consideration when configuring Management HA?A . The Database revisions will not be synchronized between the management servers B. SmartConsole must be closed prior to synchronized changes in the objects database C. If you wanted to use Full Connectivity Upgrade, you must change the Implied...
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A
Which command collects diagnostic data for analyzing customer setup remotely?
Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...
The Firewall kernel is replicated multiple times, therefore:
The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is accelerated B. The Firewall can run different policies per core C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out D. The...
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...
How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A
What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address> B. add hostname <New HostName> ip-address <ip address> C. set host name <New...
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C