Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruptionB . LDAP conflictsC . Traffic issuesD . Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....
What command would you use to restore this backup?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D Explanation: The command migrate import can be used to restore a backup of Check Point configurations without...
Which of the following statements is TRUE about R81 management plug-ins?
Which of the following statements is TRUE about R81 management plug-ins?A . The plug-in is a package installed on the Security Gateway.B . Installing a management plug-in requires a Snapshot, just like any upgrade process.C . A management plug-in interacts with a Security Management Server to provide new features and...
What command verifies that the API server is responding?
What command verifies that the API server is responding?A . api statB . api statusC . show api_statusD . app_get_statusView AnswerAnswer: B Explanation: The API server is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST...
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A Explanation: You can select the file types that are sent for...
What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...
Which TCP-port does CPM process listen to?
Which TCP-port does CPM process listen to?A . 18191B . 18190C . 8983D . 19009View AnswerAnswer: D Explanation: The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default. Reference: CPM process
To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...
What are the different command sources that allow you to communicate with the API server?
What are the different command sources that allow you to communicate with the API server?A . SmartView Monitor, API_cli Tool, Gaia CLI, Web ServicesB . SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web ServicesC . SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web ServicesD . API_cli Tool, Gaia CLI, Web...
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D Explanation: The least ideal Synchronization Status for Security Management Server High Availability deployment is Collision. This status indicates that both members have modified the...