Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command. B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast. C. Machines in a ClusterXL High Availability...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command. B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast. C. Machines in a ClusterXL High Availability...
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logd B. fwd C. fwm D. cpdView AnswerAnswer: B
The Firewall kernel is replicated multiple times, therefore:
The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is accelerated B. The Firewall can run different policies per core C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out D. The...
CoreXL is supported when one of the following features is enabled:
CoreXL is supported when one of the following features is enabled:A . Route-based VPN B. IPS C. IPv6 D. Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC) B. Restart Daemons if they fail C. Transfers messages between Firewall processes D. Pulls application monitoring statusView AnswerAnswer: D
What is true about VRRP implementations?
What is true about VRRP implementations?A . VRRP membership is enabled in cpconfig B. VRRP can be used together with ClusterXL, but with degraded performance C. You cannot have a standalone deployment D. You cannot have different VRIDs in the same physical networkView AnswerAnswer: C
Which command would disable a Cluster Member permanently?
Which command would disable a Cluster Member permanently?A . clusterXL_admin down B. cphaprob_admin down C. clusterXL_admin down-p D. set clusterXL down-pView AnswerAnswer: C