Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management DashboardB . GatewayC . Personal User StorageD ....
Which statement is NOT TRUE about Delta synchronization?
Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161B . Using UDP Multicast or Broadcast on port 8116C . Quicker than Full syncD . Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A Explanation: The statement that is not true...
Which command can you use to enable or disable multi-queue per interface?
Which command can you use to enable or disable multi-queue per interface?A . cpmq setB . Cpmqueue setC . Cpmq configD . St cpmq enableView AnswerAnswer: A Explanation: The cpmq set command enables or disables multi-queue per interface. Multi-queue is a feature that allows distributing the network traffic among several...
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:A . fw ctl multik set_mode 1B . fw ctl Dynamic_Priority_Queue onC . fw ctl Dynamic_Priority_Queue enableD . fw ctl multik set_mode 9View AnswerAnswer: D Explanation: Dynamic Dispatcher is...
What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDFC . With SDF enabled, only ClusterXL in legacy mode is supportedD . With SDF enabled, you can...
What is the correct command to observe the Sync traffic in a VRRP environment?
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”B . fw monitor Ce “accept port(6118;”C . fw monitor Ce “accept proto=mcVRRP;”D . fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D Explanation: The correct command to observe the Sync traffic in a...
Which two of these Check Point Protocols are used by SmartEvent Processes?
Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D Explanation: SmartEvent Processes use two Check Point Protocols: ELA (Event Log Agent) and CPLOG (Check Point Log). ELA collects logs...
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . ReportsB . AdvancedC . CheckupsD . ViewsE . SummaryView AnswerAnswer: A Explanation: Advanced Security Checkups can be easily conducted within the Reports tab in the Logs & Monitor view in SmartConsole. The Reports tab allows you to generate and view various...
Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D Explanation: The Check Point ThreatCloud is a worldwide collaborative...