Which of the following process pulls application monitoring status?
Which of the following process pulls application monitoring status?A . fwd B. fwm C. cpwd D. cpdView AnswerAnswer: D
Which command is used to set the CCP protocol to Multicast?
Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicast B. cphaconf set_ccp multicast C. cphaconf set_ccp no_broadcast D. cphaprob set_ccp no_broadcastView AnswerAnswer: B
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention Policy B. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. In R81, IPS Exceptions cannot be attached to “all rules” D. In R81, the GeoPolicy...
Which features are only supported with R81.10 Gateways but not R77.x?
Which features are only supported with R81.10 Gateways but not R77.x?A . Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies. B. Limits the upload and download throughput for streaming media in the company to 1 Gbps. C. The rule...
Which of the following authentication methods ARE NOT used for Mobile Access?
Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS server B. Username and password (internal, LDAP) C. SecurID D. TACACS+View AnswerAnswer: D
What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address> B. add hostname <New HostName> ip-address <ip address> C. set host name <New...
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port Overflow B. Local Interface Spoofing C. Suspicious Activity Monitoring D. Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC) B. Restart Daemons if they fail C. Transfers messages between Firewall processes D. Pulls application monitoring statusView AnswerAnswer: D
Which command collects diagnostic data for analyzing customer setup remotely?
Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstat B. fw ctl affinity Cl Ca Cr Cv C. fw ctl multik stat D. cpinfoView AnswerAnswer: B