Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

August 16, 2023 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D

August 16, 2023 No Comments READ MORE +

In R81 spoofing is defined as a method of:

In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...

August 16, 2023 No Comments READ MORE +

CPM process stores objects, policies, users, administrators, licenses and management data in a database.

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQL B. Postgres SQL C. MarisDB D. SOLRView AnswerAnswer: B

August 16, 2023 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A

August 16, 2023 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

August 16, 2023 No Comments READ MORE +

Which of the following authentication methods ARE NOT used for Mobile Access?

Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS server B. Username and password (internal, LDAP) C. SecurID D. TACACS+View AnswerAnswer: D

August 16, 2023 No Comments READ MORE +

Connections to the Check Point R81 Web API use what protocol?

Connections to the Check Point R81 Web API use what protocol?A . HTTPS B. RPC C. VPN D. SICView AnswerAnswer: A

August 16, 2023 No Comments READ MORE +

Which of the following process pulls application monitoring status?

Which of the following process pulls application monitoring status?A . fwd B. fwm C. cpwd D. cpdView AnswerAnswer: D

August 15, 2023 No Comments READ MORE +

How can you enable them?

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...

August 15, 2023 No Comments READ MORE +