What command verifies that the API server is responding?
What command verifies that the API server is responding?A . api stat B. api status C. show api_status D. app_get_statusView AnswerAnswer: B
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/Bypass B. Inspect/Prevent C. Prevent/Bypass D. Detect/BypassView AnswerAnswer: A
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful Mode B. VPN Routing Mode C. Wire Mode D. Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...
Which statement is NOT TRUE about Delta synchronization?
Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161 B. Using UDP Multicast or Broadcast on port 8116 C. Quicker than Full sync D. Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A
Which features are only supported with R81.10 Gateways but not R77.x?
Which features are only supported with R81.10 Gateways but not R77.x?A . Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies. B. Limits the upload and download throughput for streaming media in the company to 1 Gbps. C. The rule...
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCP B. infoview C. cpinfo D. fw cpinfoView AnswerAnswer: C
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself. B. SmartConsole C. SecureClient D. Security Gateway E. SmartEventView AnswerAnswer: D
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command. B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast. C. Machines in a ClusterXL High Availability...
In R81 spoofing is defined as a method of:
In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...
How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A