Which of the following process pulls application monitoring status?
Which of the following process pulls application monitoring status?A . fwd B. fwm C. cpwd D. cpdView AnswerAnswer: D
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . Synchronized B. Never been synchronized C. Lagging D. CollisionView AnswerAnswer: D
Fill in the blank: The command ___________________ provides the most complete restoration of a
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_import B. cpconfig C. fwm dbimport -p <export file> D. cpinfo CrecoverView AnswerAnswer: A
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....
What SmartEvent component creates events?
What SmartEvent component creates events?A . Consolidation Policy B. Correlation Unit C. SmartEvent Policy D. SmartEvent GUIView AnswerAnswer: B
Which statement is correct about the Sticky Decision Function?
Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator card B. Does not support SPI’s when configured for Load Sharing C. It is automatically disabled if the Mobile Access Software Blade is enabled on the...
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...