Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....
Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2B . 1C . 4D . 6View AnswerAnswer: B
Identify the API that is not supported by Check Point currently.
Identify the API that is not supported by Check Point currently.A . R81 Management API-B . Identity Awareness Web Services APIC . Open REST APID . OPSEC SDKView AnswerAnswer: C
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...
To fully enable Dynamic Dispatcher on a Security Gateway:
To fully enable Dynamic Dispatcher on a Security Gateway:A . run fw ctl multik set_mode 9 in Expert mode and then Reboot.B . Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.C . Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save,...
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpmB . fwm via fwdC . cpm via cpdD . fwd via cpdView AnswerAnswer: A
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted ConnectionsB . IPSC . ClusterXL in load sharing ModeD . CoreXLView AnswerAnswer: A
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
Which command lists all tables in Gaia?
Which command lists all tables in Gaia?A . fw tab CtB . fw tab ClistC . fw-tab CsD . fw tab -1View AnswerAnswer: C