The Event List within the Event tab contains:

The Event List within the Event tab contains:A . a list of options available for running a query. B. the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list. C. events generated by a query. D. the details of a...

August 12, 2023 No Comments READ MORE +

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50% B. 75% C. 80% D. 15%View AnswerAnswer: D

August 12, 2023 No Comments READ MORE +

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routing B. Failovers C. Asymmetric routing D. Anti-SpoofingView AnswerAnswer: C

August 12, 2023 No Comments READ MORE +

Which CLI command will reset the IPS pattern matcher statistics?

Which CLI command will reset the IPS pattern matcher statistics?A . ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats resetView AnswerAnswer: D

August 12, 2023 No Comments READ MORE +

Which command will allow you to see the interface status?

Which command will allow you to see the interface status?A . cphaprob interface B. cphaprob CI interface C. cphaprob Ca if D. cphaprob statView AnswerAnswer: C

August 12, 2023 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureID B. SecurID C. Complexity D. TacAcsView AnswerAnswer: B

August 12, 2023 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backup B. import backup C. cp_merge D. migrate importView AnswerAnswer: D

August 11, 2023 No Comments READ MORE +

R81.10 management server can manage gateways with which versions installed?

R81.10 management server can manage gateways with which versions installed?A . Versions R77 and higher B. Versions R76 and higher C. Versions R75.20 and higher D. Versions R75 and higherView AnswerAnswer: C

August 11, 2023 No Comments READ MORE +

Which packet info is ignored with Session Rate Acceleration?

Which packet info is ignored with Session Rate Acceleration?A . source port ranges B. source ip C. source port D. same info from Packet Acceleration is usedView AnswerAnswer: C Explanation: Identifies connections by five attributes - source address - destination address - source port - destination port - protocol

August 11, 2023 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

August 11, 2023 No Comments READ MORE +