When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself. B. SmartConsole C. SecureClient D. Security Gateway E. SmartEventView AnswerAnswer: D
R81.10 management server can manage gateways with which versions installed?
R81.10 management server can manage gateways with which versions installed?A . Versions R77 and higher B. Versions R76 and higher C. Versions R75.20 and higher D. Versions R75 and higherView AnswerAnswer: C
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009 B. TCP Port 18190 C. TCP Port 18191 D. TCP Port...
Which CLI command will reset the IPS pattern matcher statistics?
Which CLI command will reset the IPS pattern matcher statistics?A . ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats resetView AnswerAnswer: D
What is the difference between an event and a log?
What is the difference between an event and a log?A . Events are generated at gateway according to Event Policy B. A log entry becomes an event when it matches any rule defined in Event Policy C. Events are collected with SmartWorkflow form Trouble Ticket systems D. Log and Events...
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A
CPM process stores objects, policies, users, administrators, licenses and management data in a database.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQL B. Postgres SQL C. MarisDB D. SOLRView AnswerAnswer: B
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A