Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruptionB . LDAP conflictsC . Traffic issuesD . Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

December 14, 2023 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D Explanation: The command migrate import can be used to restore a backup of Check Point configurations without...

December 14, 2023 No Comments READ MORE +

Which of the following statements is TRUE about R81 management plug-ins?

Which of the following statements is TRUE about R81 management plug-ins?A . The plug-in is a package installed on the Security Gateway.B . Installing a management plug-in requires a Snapshot, just like any upgrade process.C . A management plug-in interacts with a Security Management Server to provide new features and...

December 14, 2023 No Comments READ MORE +

What command verifies that the API server is responding?

What command verifies that the API server is responding?A . api statB . api statusC . show api_statusD . app_get_statusView AnswerAnswer: B Explanation: The API server is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST...

December 13, 2023 No Comments READ MORE +

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A Explanation: You can select the file types that are sent for...

December 13, 2023 No Comments READ MORE +

What are the two modes of SNX?

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...

December 13, 2023 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191B . 18190C . 8983D . 19009View AnswerAnswer: D Explanation: The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default. Reference: CPM process

December 13, 2023 No Comments READ MORE +

To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...

December 12, 2023 No Comments READ MORE +

What are the different command sources that allow you to communicate with the API server?

What are the different command sources that allow you to communicate with the API server?A . SmartView Monitor, API_cli Tool, Gaia CLI, Web ServicesB . SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web ServicesC . SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web ServicesD . API_cli Tool, Gaia CLI, Web...

December 12, 2023 No Comments READ MORE +

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D Explanation: The least ideal Synchronization Status for Security Management Server High Availability deployment is Collision. This status indicates that both members have modified the...

December 12, 2023 No Comments READ MORE +