What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...
How many options are available to calculate the traffic direction?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; API B. 3 Incoming; Outgoing; Network C. 2 Internal; External...
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...
What is the correct command to observe the Sync traffic in a VRRP environment?
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .A . TCP Port 18190 B. TCP Port 18209 C. TCP Port 19009 D. TCP Port 18191View AnswerAnswer: D
Which one is NOT correct?
There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?A . Using Web Services B. Using Mgmt_cli tool C. Using CLISH D. Using SmartConsole GUI console E. Events are collected with SmartWorkflow from Trouble Ticket systemsView AnswerAnswer: E
Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D
Which of the following statements is TRUE about R81 management plug-ins?
Which of the following statements is TRUE about R81 management plug-ins?A . The plug-in is a package installed on the Security Gateway. B. Installing a management plug-in requires a Snapshot, just like any upgrade process. C. A management plug-in interacts with a Security Management Server to provide new features and...
To fully enable Dynamic Dispatcher on a Security Gateway:
To fully enable Dynamic Dispatcher on a Security Gateway:A . run fw ctl multik set_mode 9 in Expert mode and then Reboot. B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu. C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save,...
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logd B. fwd C. fwm D. cpdView AnswerAnswer: B