Which packet info is ignored with Session Rate Acceleration?

Which packet info is ignored with Session Rate Acceleration?A . source port rangesB . source ipC . source portD . same info from Packet Acceleration is usedView AnswerAnswer: C

July 18, 2022 No Comments READ MORE +

fwssd is a child process of which of the following Check Point daemons?

fwssd is a child process of which of the following Check Point daemons?A . fwdB . cpwdC . fwmD . cpdView AnswerAnswer: A

July 18, 2022 No Comments READ MORE +

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009B . TCP Port 18190C . TCP Port 18191D . TCP Port...

July 18, 2022 No Comments READ MORE +

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logdB . fwdC . fwmD . cpdView AnswerAnswer: B

July 18, 2022 No Comments READ MORE +

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful ModeB . VPN Routing ModeC . Wire ModeD . Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...

July 18, 2022 No Comments READ MORE +

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C

July 18, 2022 No Comments READ MORE +

Which method below is NOT one of the ways to communicate using the Management API’s?

Which method below is NOT one of the ways to communicate using the Management API’s?A . Typing API commands using the “mgmt_cli” commandB . Typing API commands from a dialog box inside the SmartConsole GUI applicationC . Typing API commands using Gaia’s secure shell(clish)19+D . Sending API commands over an...

July 18, 2022 No Comments READ MORE +

Connections to the Check Point R81 Web API use what protocol?

Connections to the Check Point R81 Web API use what protocol?A . HTTPSB . RPCC . VPND . SICView AnswerAnswer: A

July 17, 2022 No Comments READ MORE +

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruptionB . LDAP conflictsC . Traffic issuesD . Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

July 17, 2022 No Comments READ MORE +

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A

July 17, 2022 No Comments READ MORE +