What is NOT an advantage of Packet Filtering?
What is NOT an advantage of Packet Filtering?A . Low Security and No Screening above Network LayerB . Application IndependenceC . High PerformanceD . ScalabilityView AnswerAnswer: A Explanation: Packet Filter Advantages and Disadvantages
Why would an administrator see the message below?
Why would an administrator see the message below? A . A new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding.B . A new Policy Package created on the Management is going to be installed to the existing Gateway.C...
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?A . INSPECT EngineB . Stateful InspectionC . Packet FilteringD . Application Layer FirewallView AnswerAnswer: B
Which command is used to obtain the configuration lock in Gaia?
Which command is used to obtain the configuration lock in Gaia?A . Lock database overrideB . Unlock database overrideC . Unlock database lockD . Lock database userView AnswerAnswer: A Explanation: Obtaining a Configuration Lock lock database override unlock database
Which encryption is used in Secure Internal Communication (SIC) between central management and firewall on each location?
Vanessa is firewall administrator in her company; her company is using Check Point firewalls on central and remote locations, which are managed centrally by R80 Security Management Server. One central location has an installed R77.30 Gateway on Open server. Remote location is using Check Point UTM-1 570 series appliance with...
Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.
Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo -recoverView AnswerAnswer: A Explanation: (Should be "migrate import") "migrate import" Restores backed up configuration for R80 version, in previous versions the command...
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical interface.
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical interface.A . VPN Tunnel InterfaceB . VPN communityC . VPN routerD . VPN interfaceView AnswerAnswer: A Explanation: Route Based VPN VPN traffic is routed according to the routing settings...
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .A . Rule base, Security Management Server, Security GatewaysB . SmartConsole, Security Gateway, Security Management ServersC . SmartConsole, Security Management Server, Security GatewaysD . The Check Point...
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...
What is the correct address to access the Web UI for Gaia platform via browser?
Joey wants to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?A . https://<Device_IP_Address>B . https://<Device_IP_Address>:443C . https://<Device_IP_Address>:10000D . https://<Device_IP_Address>:4434View AnswerAnswer: A Explanation: Access to Web UI Gaia administration interface,...