What happen when IPS profile is set in Detect Only Mode for troubleshooting?

What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...

July 17, 2022 No Comments READ MORE +

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50%B . 75%C . 80%D . 15%View AnswerAnswer: D

July 17, 2022 No Comments READ MORE +

Which of the following authentication methods ARE NOT used for Mobile Access?

Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D

July 17, 2022 No Comments READ MORE +

On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:A . 18210B . 18184C . 257D . 18191View AnswerAnswer: B

July 16, 2022 No Comments READ MORE +

CoreXL is supported when one of the following features is enabled:

CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:

July 16, 2022 No Comments READ MORE +

What is true about VRRP implementations?

What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C

July 16, 2022 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B

July 16, 2022 No Comments READ MORE +

Which view is NOT a valid CPVIEW view?

Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C

July 16, 2022 No Comments READ MORE +

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D

July 16, 2022 No Comments READ MORE +

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malwareB . Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control CentersC . Anti-Bot is the only...

July 16, 2022 No Comments READ MORE +