How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
What is the correct command to observe the Sync traffic in a VRRP environment?
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D
What is the difference between an event and a log?
What is the difference between an event and a log?A . Events are generated at gateway according to Event Policy B. A log entry becomes an event when it matches any rule defined in Event Policy C. Events are collected with SmartWorkflow form Trouble Ticket systems D. Log and Events...
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic ID B. RADIUS C. Username and Password D. CertificateView AnswerAnswer: A
What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender. B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect D. Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D
What command will you use to provide such information to manager?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?A . fw accel stat B. fwaccel stat C. fw acces stats D. fwaccel statsView AnswerAnswer: B Explanation: Reference: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_PerformanceTuning_AdminGuide/Topics-PTG/CLI/fwaccel-stat.htm
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:A . 18210 B. 18184 C. 257 D. 18191View AnswerAnswer: B
Which view is NOT a valid CPVIEW view?
Which view is NOT a valid CPVIEW view?A . IDA B. RAD C. PDP D. VPNView AnswerAnswer: C
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:A . fw ctl multik set_mode 1 B. fw ctl Dynamic_Priority_Queue on C. fw ctl Dynamic_Priority_Queue enable D. fw ctl multik set_mode 9View AnswerAnswer: D