Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________.

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________.A . User DirectoryB . Captive Portal and Transparent Kerberos AuthenticationC . Captive PortalD . UserCheckView AnswerAnswer: B Explanation: To enable Identity Awareness: Log in to SmartDashboard. From the Network Objects tree, expand ...

December 27, 2018 No Comments READ MORE +

Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .

Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .A . Passwords; tokensB . Certificates; pre-shared secretsC . Certificates; passwordsD . Tokens; pre-shared secretsView AnswerAnswer: B Explanation: VPN gateways authenticate using Digital Certificates and Pre-shared secrets.

December 22, 2018 No Comments READ MORE +

What is a precedence of traffic inspection for the defined polices?

On the following graphic, you will find layers of policies. What is a precedence of traffic inspection for the defined polices?A . A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes...

December 21, 2018 No Comments READ MORE +

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?A . UserCheckB . Active Directory QueryC . Account Unit QueryD . User Directory QueryView AnswerAnswer: B Explanation: AD Query extracts user and computer identity information from the Active Directory...

December 20, 2018 No Comments READ MORE +

Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?

Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?A . vpn tuB . vpn ipsec remove -lC . vpn debug ipsecD . fw ipsec tuView AnswerAnswer: A Explanation: vpn tu Description Launch the TunnelUtil tool which is used to control VPN tunnels. Usage vpn tu...

December 19, 2018 No Comments READ MORE +

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...

December 11, 2018 No Comments READ MORE +

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . SmartEventView AnswerAnswer: D Explanation: There are different deployment scenarios for Check Point software products. Standalone Deployment...

December 8, 2018 1 Comment READ MORE +

Which authentication scheme requires a user to possess a token?

Which authentication scheme requires a user to possess a token?A . TACACSB . SecurIDC . Check Point passwordD . RADIUSView AnswerAnswer: B Explanation: SecurID SecurID requires users to both possess a token authenticator and to supply a PIN or password

December 7, 2018 No Comments READ MORE +

What does the lock-symbol in the left column mean?

View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer. A . The current administrator has read-only permissions to Threat Prevention Policy.B . Another user has locked the rule for editing.C . Configuration lock is present. Click the lock symbol to gain read-write...

December 5, 2018 No Comments READ MORE +

The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _______ .

The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _______ .A . TCP 18211B . TCP 257C . TCP 4433D . TCP 443View AnswerAnswer: D

December 2, 2018 No Comments READ MORE +