Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C
What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...
The Firewall kernel is replicated multiple times, therefore:
The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is acceleratedB . The Firewall can run different policies per coreC . The Firewall kernel is replicated only with new connections and deletes itself once the connection times outD . The...
Post-Automatic/Manual NAT rules
Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . ReportsB . AdvancedC . CheckupsD . ViewsE . SummaryView AnswerAnswer: A
What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDFC . With SDF enabled, only ClusterXL in legacy mode is supportedD . With SDF enabled, you can...
Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention PolicyB . In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R81, IPS Exceptions cannot be attached to “all rules”D . In R81, the GeoPolicy...