Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C

July 15, 2022 No Comments READ MORE +

What are the two modes of SNX?

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...

July 15, 2022 No Comments READ MORE +

The Firewall kernel is replicated multiple times, therefore:

The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is acceleratedB . The Firewall can run different policies per coreC . The Firewall kernel is replicated only with new connections and deletes itself once the connection times outD . The...

July 15, 2022 No Comments READ MORE +

Post-Automatic/Manual NAT rules

Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

Advanced Security Checkups can be easily conducted within:

Advanced Security Checkups can be easily conducted within:A . ReportsB . AdvancedC . CheckupsD . ViewsE . SummaryView AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

What is the limitation of employing Sticky Decision Function?

What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDFC . With SDF enabled, only ClusterXL in legacy mode is supportedD . With SDF enabled, you can...

July 14, 2022 No Comments READ MORE +

Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D

July 14, 2022 No Comments READ MORE +

What is true about the IPS-Blade?

What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention PolicyB . In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R81, IPS Exceptions cannot be attached to “all rules”D . In R81, the GeoPolicy...

July 14, 2022 No Comments READ MORE +