Gaia can be configured using the _______ or ______ .
Gaia can be configured using the _______ or ______ .A . GaiaUI; command line interfaceB . WebUI; Gaia InterfaceC . Command line interface; WebUID . Gaia Interface; GaiaUIView AnswerAnswer: C Explanation: Configuring Gaia for the First Time In This Section: - Running the First Time Configuration Wizard in WebUI -...
Which policy type has its own Exceptions section?
Which policy type has its own Exceptions section?A . Thread PreventionB . Access ControlC . Threat EmulationD . Desktop SecurityView AnswerAnswer: A Explanation: The Exceptions Groups pane lets you define exception groups. When necessary, you can create exception groups to use in the Rule Base. An exception group contains one...
What will be the effect of running the following command on the Security Management Server?
What will be the effect of running the following command on the Security Management Server? A . Remove the installed Security Policy.B . Remove the local ACL lists.C . No effect.D . Reset SIC on all gateways.View AnswerAnswer: A Explanation: This command uninstall actual security policy (already installed)
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?A . UserCheckB . Active Directory QueryC . Account Unit QueryD . User Directory QueryView AnswerAnswer: B Explanation: AD Query extracts user and computer identity information from the Active Directory...
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.A . NT domainB . SMTPC . LDAPD . SecurIDView AnswerAnswer: C
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?A . vpn tuB . vpn ipsec remove -lC . vpn debug ipsecD . fw ipsec tuView AnswerAnswer: A Explanation: vpn tu Description Launch the TunnelUtil tool which is used to control VPN tunnels. Usage vpn tu...
Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .
Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .A . Passwords; tokensB . Certificates; pre-shared secretsC . Certificates; passwordsD . Tokens; pre-shared secretsView AnswerAnswer: B Explanation: VPN gateways authenticate using Digital Certificates and Pre-shared secrets.
Why does it not allow him to specify the pre-shared secret?
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable...
In which deployment is the security management server and Security Gateway installed on the same appliance?
In which deployment is the security management server and Security Gateway installed on the same appliance?A . Bridge ModeB . RemoteC . StandaloneD . DistributedView AnswerAnswer: C Explanation: Installing Standalone Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.
Which Check Point feature enables application scanning and the detection?
Which Check Point feature enables application scanning and the detection?A . Application DictionaryB . AppWikiC . Application LibraryD . CPAppView AnswerAnswer: B Explanation: AppWiki Application Classification Library AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video...