CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQLB . Postgres SQLC . MarisDBD . SOLRView AnswerAnswer: B Explanation: CPM process stores objects, policies, users, administrators, licenses and management data in a Postgres SQL database. This database is located in...

December 9, 2023 No Comments READ MORE +

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...

December 9, 2023 No Comments READ MORE +

How many options are available to calculate the traffic direction?

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD...

December 8, 2023 No Comments READ MORE +

R81.20 management server can manage gateways with which versions installed?

R81.20 management server can manage gateways with which versions installed?A . Versions R77 and higherB . Versions R76 and higherC . Versions R75.20 and higherD . Versions R75 and higherView AnswerAnswer: C Explanation: R81.20 management server can manage gateways with versions R75.20 and higher. However, some features may not be...

December 8, 2023 No Comments READ MORE +

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...

December 8, 2023 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . AcceptB . DropC . NATD . NoneView AnswerAnswer: D

December 8, 2023 No Comments READ MORE +

Which statement is correct about the Sticky Decision Function?

Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator cardB . Does not support SPI’s when configured for Load SharingC . It is automatically disabled if the Mobile Access Software Blade is enabled on the...

December 8, 2023 No Comments READ MORE +

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . Security GatewayE . SmartEventView AnswerAnswer: D Explanation: When doing a Stand-Alone Installation, you would install the...

December 8, 2023 No Comments READ MORE +

Which of the following authentication methods ARE NOT used for Mobile Access?

Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D Explanation: TACACS+ is not an authentication method that is used for Mobile Access. Mobile Access supports the following authentication methods: username and password...

December 8, 2023 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B Explanation: When requiring certificates for mobile devices, the authentication method should be set to one of...

December 8, 2023 No Comments READ MORE +