If you needed the Multicast MAC address of a cluster, what command would you run?

If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca if B. cphaconf ccp multicast C. cphaconf debug data D. cphaprob igmpView AnswerAnswer: D

January 30, 2023 No Comments READ MORE +

Which packet info is ignored with Session Rate Acceleration?

Which packet info is ignored with Session Rate Acceleration?A . source port ranges B. source ip C. source port D. same info from Packet Acceleration is usedView AnswerAnswer: B

January 29, 2023 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

January 29, 2023 No Comments READ MORE +

Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...

January 29, 2023 No Comments READ MORE +

How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A

January 29, 2023 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D

January 29, 2023 No Comments READ MORE +

What is the correct command to observe the Sync traffic in a VRRP environment?

What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D

January 28, 2023 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureID B. SecurID C. Complexity D. TacAcsView AnswerAnswer: B

January 28, 2023 No Comments READ MORE +

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...

January 28, 2023 No Comments READ MORE +

Which of those hosts should you try to remediate first?

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....

January 28, 2023 No Comments READ MORE +