Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?

Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...

May 10, 2019 No Comments READ MORE +

When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?

When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?A . All Account-Unit's UsersB . Only Group in BranchC . Group AgnosticD . OU Accept and select appropriate domainView AnswerAnswer: B

May 10, 2019 No Comments READ MORE +

If you are experiencing LDAP issues, which of the following should you check?

If you are experiencing LDAP issues, which of the following should you check?A . Secure Internal Communications (SIC)B . Domain name resolutionC . Overlapping VPN DomainsD . Connectivity between the R76 Gateway and LDAP serverView AnswerAnswer: D

May 10, 2019 No Comments READ MORE +

What do you expect to find?

You use the snapshot feature to store your Connecter SSL VPN configuration. What do you expect to find?A . Nothing; snapshot is not supported in Connector SSL VPC . The management configuration of the current product, on a management or stand-alone machineD . A complete image of the local file...

May 10, 2019 No Comments READ MORE +

Match the VPN-related terms with their definitions:

Match the VPN-related terms with their definitions: A . A-3, B-2, C-1, D-4B . A-3, B-4, C-1, D-2C . A-3, B-2, C-4, D-1D . A-2, B-3, C-4, D-1View AnswerAnswer: C

May 9, 2019 No Comments READ MORE +

Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?

Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...

May 9, 2019 No Comments READ MORE +

In a "zero downtime" scenario, which command do you run manually after all cluster members are upgraded?

In a "zero downtime" scenario, which command do you run manually after all cluster members are upgraded?A . cphaconf set_ccp broadcastB . cphaconf set clear_subsC . cphaconf set mc_relodD . cphaconf set_ccp multicastView AnswerAnswer: D

May 9, 2019 No Comments READ MORE +

By default Check Point High Availability components send updates about their state every:

By default Check Point High Availability components send updates about their state every:A . 5 seconds.B . 0.5 second.C . 0.1 second.D . 1 second.View AnswerAnswer: C

May 9, 2019 No Comments READ MORE +

Where is the encryption domain for a Smart LSM Security Gateway configured in R71?

Where is the encryption domain for a Smart LSM Security Gateway configured in R71?A . Inside the Smart LSM Security Gateway object in the Smart Dashboard GUIB . Inside the Smart LSM Security Gateway profile in the Smart Provisioning GUIC . Inside the Smart LSM Security Gateway object in the...

May 9, 2019 No Comments READ MORE +

In Cluster XL, _______ is defined by default as a critical device.

In Cluster XL, _______ is defined by default as a critical device.A . fw.dB . protect.exeC . PROT_SRD . EXEE . FilterView AnswerAnswer: D

May 9, 2019 No Comments READ MORE +