Which command is used to add users to or from existing roles?
Which command is used to add users to or from existing roles?A . Add rba user <User Name> roles <List>B . Add rba user <User Name>C . Add user <User Name> roles <List>D . Add user <User Name>View AnswerAnswer: A Explanation: Configuring Roles - CLI (rba)
Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?
The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?A . show configurationB . backupC . migrate exportD . upgrade exportView AnswerAnswer: B Explanation:
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?A . To satellites through center onlyB . To center onlyC . To center and to other satellites through centerD . To center, or through the center to other satellites, to internet and other VPN targetsView AnswerAnswer:...
Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.
Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.A . Application ControlB . Data AwarenessC . URL FilteringD . Threat EmulationView AnswerAnswer: A
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?A . FullB . LightC . CustomD . CompleteView AnswerAnswer: A Explanation: Endpoint Identity Agents C dedicated client agents installed on users’ computers that acquire and report identities to the Security Gateway.
On the following picture an administrator configures Identity Awareness:
On the following picture an administrator configures Identity Awareness: After clicking “Next” the above configuration is supported by:A . Kerberos SSO which will be working for Active Directory integrationB . Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses...
Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?
The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?A . show configurationB . backupC . migrate exportD . upgrade exportView AnswerAnswer: B Explanation:
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?A . PentagonB . CombinedC . MeshedD . StarView AnswerAnswer: D Explanation: VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN connections between...
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?A . RADIUSB . Remote Access and RADIUSC . AD QueryD . AD Query and Browser-based AuthenticationView AnswerAnswer: D Explanation: Identity Awareness gets identities from these acquisition sources: AD Query Browser-Based Authentication Endpoint Identity Agent Terminal Servers Identity...
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
Fill in the blanks: A Check Point software license consists of a _______ and _______ .A . Software container; software packageB . Software blade; software containerC . Software package; signatureD . Signature; software bladeView AnswerAnswer: B Explanation: Check Point's licensing is designed to be scalable and modular. To this end,...