Which command can you use to verify the number of active concurrent connections?

Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B

January 21, 2023 No Comments READ MORE +

What is the least amount of CPU cores required to enable CoreXL?

What is the least amount of CPU cores required to enable CoreXL?A . 2 B. 1 C. 4 D. 6View AnswerAnswer: A

January 20, 2023 No Comments READ MORE +

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logd B. fwd C. fwm D. cpdView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

Which statement is NOT TRUE about Delta synchronization?

Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161 B. Using UDP Multicast or Broadcast on port 8116 C. Quicker than Full sync D. Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A

January 20, 2023 No Comments READ MORE +

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50% B. 75% C. 80% D. 15%View AnswerAnswer: D

January 20, 2023 No Comments READ MORE +

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

January 20, 2023 No Comments READ MORE +

What SmartEvent component creates events?

What SmartEvent component creates events?A . Consolidation Policy B. Correlation Unit C. SmartEvent Policy D. SmartEvent GUIView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D

January 20, 2023 No Comments READ MORE +

How many options are available to calculate the traffic direction?

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; API B. 3 Incoming; Outgoing; Network C. 2 Internal; External...

January 20, 2023 No Comments READ MORE +

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...

January 20, 2023 No Comments READ MORE +