Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...

December 7, 2023 No Comments READ MORE +

Which component is NOT part of the SandBlast Mobile solution?

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management DashboardB . GatewayC . Personal User StorageD ....

December 7, 2023 No Comments READ MORE +

Which statement is NOT TRUE about Delta synchronization?

Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161B . Using UDP Multicast or Broadcast on port 8116C . Quicker than Full syncD . Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A Explanation: The statement that is not true...

December 7, 2023 No Comments READ MORE +

Which command can you use to enable or disable multi-queue per interface?

Which command can you use to enable or disable multi-queue per interface?A . cpmq setB . Cpmqueue setC . Cpmq configD . St cpmq enableView AnswerAnswer: A Explanation: The cpmq set command enables or disables multi-queue per interface. Multi-queue is a feature that allows distributing the network traffic among several...

December 7, 2023 No Comments READ MORE +

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:A . fw ctl multik set_mode 1B . fw ctl Dynamic_Priority_Queue onC . fw ctl Dynamic_Priority_Queue enableD . fw ctl multik set_mode 9View AnswerAnswer: D Explanation: Dynamic Dispatcher is...

December 7, 2023 No Comments READ MORE +

What is the limitation of employing Sticky Decision Function?

What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDFC . With SDF enabled, only ClusterXL in legacy mode is supportedD . With SDF enabled, you can...

December 7, 2023 No Comments READ MORE +

What is the correct command to observe the Sync traffic in a VRRP environment?

What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”B . fw monitor Ce “accept port(6118;”C . fw monitor Ce “accept proto=mcVRRP;”D . fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D Explanation: The correct command to observe the Sync traffic in a...

December 7, 2023 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D Explanation: SmartEvent Processes use two Check Point Protocols: ELA (Event Log Agent) and CPLOG (Check Point Log). ELA collects logs...

December 7, 2023 No Comments READ MORE +

Advanced Security Checkups can be easily conducted within:

Advanced Security Checkups can be easily conducted within:A . ReportsB . AdvancedC . CheckupsD . ViewsE . SummaryView AnswerAnswer: A Explanation: Advanced Security Checkups can be easily conducted within the Reports tab in the Logs & Monitor view in SmartConsole. The Reports tab allows you to generate and view various...

December 7, 2023 No Comments READ MORE +

Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D Explanation: The Check Point ThreatCloud is a worldwide collaborative...

December 7, 2023 No Comments READ MORE +