Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...

January 6, 2021 No Comments READ MORE +

What must be done for the “fw monitor” command to capture packets through the firewall kernel?

What must be done for the “fw monitor” command to capture packets through the firewall kernel?A . SecureXL must be disabledB . ClusterXL must be temporarily disabledC . Firewall policy must be re-installedD . The output file must be transferred to a machine with WireSharkView AnswerAnswer: A Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583

January 6, 2021 No Comments READ MORE +

Which of the following is not one of the relational database domains that stores the management configuration?

Which of the following is not one of the relational database domains that stores the management configuration?A . User DomainB . System DomainC . Global DomainD . Audit DomainView AnswerAnswer: D

January 6, 2021 No Comments READ MORE +

Which command would you use to check CoreXL instances for IPv6 traffic?

Which command would you use to check CoreXL instances for IPv6 traffic?A . fwaccel6 statsB . fwaccel6 statC . fw ctl multik statD . fw6ctl multik statView AnswerAnswer: C

January 6, 2021 No Comments READ MORE +

What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?

What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?A . .capB . .exeC . .tgzD . .pcapView AnswerAnswer: A

January 5, 2021 No Comments READ MORE +

Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.

Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C

January 5, 2021 No Comments READ MORE +

The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _____________.

The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _____________.A . TCP 18211B . TCP 257C . TCP 4433D . TCP 443View AnswerAnswer: D

January 5, 2021 No Comments READ MORE +

Which is the correct “fw monitor” syntax for creating a capture file for loading it into WireShark?

Which is the correct “fw monitor” syntax for creating a capture file for loading it into WireShark?A . fw monitor Ce “accept <FILTER EXPRESSION>; “>> Output.capB . This cannot be accomplished as it is not supported with R80.10C . fw monitor Ce “accept <FILTER EXPRESSION>;” Cfile Output.capD . fw monitor...

January 5, 2021 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address TranslationB . Hiding your firewall from unauthorized usersC . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come an authorized...

January 5, 2021 No Comments READ MORE +

Fill in the blank: The R80 feature _________________ permits blocking specific IP addresses for a specified time period.

Fill in the blank: The R80 feature _________________ permits blocking specific IP addresses for a specified time period.A . Block Port OverflowB . Local Interface SpoofingC . Suspicious Activity MonitoringD . Adaptive Threat PreventionView AnswerAnswer: C

January 5, 2021 No Comments READ MORE +