What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1 B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF C. With SDF enabled, only ClusterXL in legacy mode is supported D. With SDF enabled, you can...
Which command can you use to verify the number of active concurrent connections?
Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B
To fully enable Dynamic Dispatcher on a Security Gateway:
To fully enable Dynamic Dispatcher on a Security Gateway:A . run fw ctl multik set_mode 9 in Expert mode and then Reboot. B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu. C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save,...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command. B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast. C. Machines in a ClusterXL High Availability...
If you needed the Multicast MAC address of a cluster, what command would you run?
If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca if B. cphaconf ccp multicast C. cphaconf debug data D. cphaprob igmpView AnswerAnswer: D
Post-Automatic/Manual NAT rules
Post-Automatic/Manual NAT rulesA . 1,2,3,4 B. 1,4,2,3 C. 3,1,2,4 D. 4,3,1,2View AnswerAnswer: A
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection traffic B. Automatically uploads debugging logs to Check Point Support Center C. It will not block malicious traffic D. Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstat B. fw ctl affinity Cl Ca Cr Cv C. fw ctl multik stat D. cpinfoView AnswerAnswer: B
Connections to the Check Point R81 Web API use what protocol?
Connections to the Check Point R81 Web API use what protocol?A . HTTPS B. RPC C. VPN D. SICView AnswerAnswer: A
Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applications B. Prevents or controls access to web sites based on category C. Prevents Cloud vulnerability exploits D. A worldwide collaborative security networkView AnswerAnswer: D