Which command can you use to verify the number of active concurrent connections?
Which command can you use to verify the number of active concurrent connections?A . fw conn allB . fw ctl pstatC . show all connectionsD . show connectionsView AnswerAnswer: B Explanation: The command fw ctl pstat can be used to verify the number of active concurrent connections on a gateway....
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2B . 1C . 4D . 6View AnswerAnswer: A Explanation: The least amount of CPU cores required to enable CoreXL is 2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU...
Which CLI command will reset the IPS pattern matcher statistics?
Which CLI command will reset the IPS pattern matcher statistics?A . ips reset pmstatB . ips pstats resetC . ips pmstats refreshD . ips pmstats resetView AnswerAnswer: D Explanation: The CLI command to reset the IPS (Intrusion Prevention System) pattern matcher statistics is option D: ips pmstats reset. This command...
Which command will allow you to see the interface status?
Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: The cphaprob -a if command displays the interface status of all cluster members, including the interface name, IP address, state, monitor mode, and...
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpmB . fwm via fwdC . cpm via cpdD . fwd via cpdView AnswerAnswer: A Explanation: The fwd process on the Security Gateway sends logs to...
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C Explanation: The cpinfo tool generates a R81 Security Gateway configuration report that includes information about the hardware, operating system, product version, patches, and configuration settings....
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A Explanation: Gateway API is not an example of a Check Point API. Check Point APIs are interfaces that enable interactions with Check Point products using...
Which one is NOT correct?
There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?A . Using Web ServicesB . Using Mgmt_cli toolC . Using CLISHD . Using SmartConsole GUI consoleE . Events are collected with SmartWorkflow from Trouble Ticket systemsView AnswerAnswer: E...
What is true about VRRP implementations?
What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C Explanation:
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?A . Big lB . Little oC . Little iD . Big OView AnswerAnswer: A Explanation: The inspection point Big l...