Which command would disable a Cluster Member permanently?
Which command would disable a Cluster Member permanently?A . clusterXL_admin down B. cphaprob_admin down C. clusterXL_admin down-p D. set clusterXL down-pView AnswerAnswer: C
Which of the following process pulls application monitoring status?
Which of the following process pulls application monitoring status?A . fwd B. fwm C. cpwd D. cpdView AnswerAnswer: D
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009 B. TCP Port 18190 C. TCP Port 18191 D. TCP Port...
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A
Which command lists all tables in Gaia?
Which command lists all tables in Gaia?A . fw tab Ct B. fw tab Clist C. fw-tab Cs D. fw tab -1View AnswerAnswer: C
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . Synchronized B. Never been synchronized C. Lagging D. CollisionView AnswerAnswer: D
Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention Policy B. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. In R81, IPS Exceptions cannot be attached to “all rules” D. In R81, the GeoPolicy...
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection traffic B. Automatically uploads debugging logs to Check Point Support Center C. It will not block malicious traffic D. Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself. B. SmartConsole C. SecureClient D. Security Gateway E. SmartEventView AnswerAnswer: D