Which command is used to add users to or from existing roles?

Which command is used to add users to or from existing roles?A . Add rba user <User Name> roles <List>B . Add rba user <User Name>C . Add user <User Name> roles <List>D . Add user <User Name>View AnswerAnswer: A Explanation: Configuring Roles - CLI (rba)

September 16, 2018 No Comments READ MORE +

Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?

The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?A . show configurationB . backupC . migrate exportD . upgrade exportView AnswerAnswer: B Explanation:

September 12, 2018 No Comments READ MORE +

Which VPN routing option uses VPN routing for every connection a satellite gateway handles?

Which VPN routing option uses VPN routing for every connection a satellite gateway handles?A . To satellites through center onlyB . To center onlyC . To center and to other satellites through centerD . To center, or through the center to other satellites, to internet and other VPN targetsView AnswerAnswer:...

September 11, 2018 No Comments READ MORE +

Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.

Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.A . Application ControlB . Data AwarenessC . URL FilteringD . Threat EmulationView AnswerAnswer: A

September 3, 2018 No Comments READ MORE +

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?A . FullB . LightC . CustomD . CompleteView AnswerAnswer: A Explanation: Endpoint Identity Agents C dedicated client agents installed on users’ computers that acquire and report identities to the Security Gateway.

September 2, 2018 No Comments READ MORE +

On the following picture an administrator configures Identity Awareness:

On the following picture an administrator configures Identity Awareness: After clicking “Next” the above configuration is supported by:A . Kerberos SSO which will be working for Active Directory integrationB . Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses...

September 1, 2018 No Comments READ MORE +

Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?

The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?A . show configurationB . backupC . migrate exportD . upgrade exportView AnswerAnswer: B Explanation:

September 1, 2018 No Comments READ MORE +

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?A . PentagonB . CombinedC . MeshedD . StarView AnswerAnswer: D Explanation: VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN connections between...

August 31, 2018 No Comments READ MORE +

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?A . RADIUSB . Remote Access and RADIUSC . AD QueryD . AD Query and Browser-based AuthenticationView AnswerAnswer: D Explanation: Identity Awareness gets identities from these acquisition sources: AD Query Browser-Based Authentication Endpoint Identity Agent Terminal Servers Identity...

August 27, 2018 No Comments READ MORE +

Fill in the blanks: A Check Point software license consists of a _______ and _______ .

Fill in the blanks: A Check Point software license consists of a _______ and _______ .A . Software container; software packageB . Software blade; software containerC . Software package; signatureD . Signature; software bladeView AnswerAnswer: B Explanation: Check Point's licensing is designed to be scalable and modular. To this end,...

August 24, 2018 No Comments READ MORE +