Which of the following can NOT be modified by editing the cp_httpd_admin.conf file?
Which of the following can NOT be modified by editing the cp_httpd_admin.conf file?A . Toggling HTTP or HTTPS protocol useB . The web server portC . Modifying Web server certificate attributesD . Administrative Access LevelView AnswerAnswer: D
Your R7x-series Enterprise Security Management Server is running abnormally on Windows Server 2003 R2. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep its critical configuration?
Your R7x-series Enterprise Security Management Server is running abnormally on Windows Server 2003 R2. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BEST method...
How does Check Point recommend that you secure the sync interface between gateways?
How does Check Point recommend that you secure the sync interface between gateways?A . Configure the sync network to operate within the DMC . Secure each sync interface in a cluster with Endpoint.D . Use a dedicated sync network.E . Encrypt all sync traffic between cluster members.View AnswerAnswer: C
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?A . Smart Event databaseB . Smart Reporter databaseC . classes. C fileD . System interface configurationView AnswerAnswer: C
How do you explain to the customer about template restrictions and how to verify that they are enabled?
Your customer complains of the weak performance of his systems. He has heard that Connection Templates accelerate traffic. How do you explain to the customer about template restrictions and how to verify that they are enabled?A . To enhance connection-establishment acceleration, a mechanism attempts to "group together" all connections that...
There are times when you want to use Link Selection to manage high-traffic VPN connections.
There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:A . Use links based on Day/Time.B . Set up links for Remote Access.C . Assign links to specific VPN communities.D . Assign links to use Dynamic DNView AnswerAnswer: B
The Core XL SND (Secure Network Distributor) is responsible for:
The Core XL SND (Secure Network Distributor) is responsible for:A . distributing non-accelerated packets among kernel instancesB . accelerating VPN trafficC . shutting down cores when they are not neededD . changing routes to distribute the load across multiple firewallsView AnswerAnswer: A
What is the proper command for importing users into the R76 User Database?
What is the proper command for importing users into the R76 User Database?A . fwm dbimportB . fwm importusrsC . fwm importD . fwm importdbView AnswerAnswer: A
How are these connections secured?
Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?A . They are encrypted and authenticated using SIC . They are not encrypted, but are authenticated by the GatewayD . They are secured by PPTPE . They are...
What access level cannot be assigned to an Administrator in Smart Event?
What access level cannot be assigned to an Administrator in Smart Event?A . No AccessB . Write onlyC . Read onlyD . Events DatabaseView AnswerAnswer: B