What backup method could be used to quickly put the secondary firewall into production?
You are running a R76 Security Gateway on Secure Platform. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What backup method could be used to quickly put the secondary firewall into production?A . upgrade exportB . manual backupC ....
If you need strong protection for the encryption of user data, what option would be the BEST choice?
If you need strong protection for the encryption of user data, what option would be the BEST choice?A . When you need strong encryption, IPSec is not the best choice. SSL VPN's are a better choice.B . Use Daffier-Hellman for key construction and pre-shared keys for Quick Mode. Choose SHA...
Which of the following deployment scenarios CANNOT be managed by Check Point QoS?
Which of the following deployment scenarios CANNOT be managed by Check Point QoS?A . Two lines connected to a single router, and the router is connected directly to the GatewayB . Two lines connected to separate routers, and each router is connected to separate interfaces on the GatewayC . One...
Which gateway process is responsible for the authentication?
Remote clients are using IPSec VPN to authenticate via LDAP server to connect to the organization. Which gateway process is responsible for the authentication?A . vpndB . cpvpndC . fwmD . fwdView AnswerAnswer: A
The process that performs the authentication for Remote Access is:
The process that performs the authentication for Remote Access is:A . cpdB . vpndC . fwmD . cvpndView AnswerAnswer: B
What are the 3 main components of the Smart Event Software Blade?
What are the 3 main components of the Smart Event Software Blade? A . I, ii, iiiB . iv, v, viC . i, iv, vD . i, iii, ivView AnswerAnswer: C
Which of the following commands do you run on the AD server to identify the DN name before configuring LDAP integration with the Security Gateway?
Which of the following commands do you run on the AD server to identify the DN name before configuring LDAP integration with the Security Gateway?A . query ldap Cname administratorB . dsquery user Cname administratorC . ldapquery Cname administratorD . cpquery Cname administratorView AnswerAnswer: B
Using Smart Provisioning Profiles, which of the following could be configured for both Secure Platform AND UTM-1 Edge devices?
Using Smart Provisioning Profiles, which of the following could be configured for both Secure Platform AND UTM-1 Edge devices? (i) Backup (ii) Routing (iii) Interfaces (iv) Hosts (v) NTP server (vi) DNSA . (ii), (iii), (iv) and (vi)B . (i), (iii), (iv) and (vi)C . none of these options are...
If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP traffic?
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP...
What is the benefit to running Smart Event in Learning Mode?
What is the benefit to running Smart Event in Learning Mode?A . There is no Smart Event Learning ModeB . To run Smart Event with preloaded sample data in a test environmentC . To run Smart Event, with a step-by-step online configuration guide for training/setup purposesD . To generate a...