Which of the following is NOT a SecureXL traffic flow?
Which of the following is NOT a SecureXL traffic flow?A . Medium PathB . Accelerated PathC . Fast PathD . Slow PathView AnswerAnswer: C Explanation: SecureXL is an acceleration solution that maximizes performance of the Firewall and does not compromise security. When SecureXL is enabled on a Security Gateway, some...
Which utility allows you to configure the DHCP service on GAIA from the command line?
Which utility allows you to configure the DHCP service on GAIA from the command line?A . ifconfigB . dhcp_cfgC . sysconfigD . cpconfigView AnswerAnswer: C Explanation: Sysconfig Configuration Options
What is the MOST likely reason?
You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?A . Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install...
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______A . UserCheckB . User DirectoryC . User AdministrationD . User CenterView AnswerAnswer: B Explanation: Check Point User Directory integrates LDAP, and other external user management technologies, with the Check Point...
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.A . NT domainB . SMTPC . LDAPD . SecurIDView AnswerAnswer: C
Which of the following are types of VPN communicates?
Which of the following are types of VPN communicates?A . Pentagon, star, and combinationB . Star, octagon, and combinationC . Combined and starD . Meshed, star, and combinationView AnswerAnswer: D
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.A . /var/log/Cpbackup/backups/backup/backup_fw.tgsB . /var/log/Cpbackup/backups/backup/backup_fw.tarC . /var/log/Cpbackup/backups/backups/backup_fw.tarD . /var/log/Cpbackup/backups/backup_fw.tgzView AnswerAnswer: D Explanation: Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security Management server database, or...
Which policy type is used to enforce bandwidth and traffic control rules?
Which policy type is used to enforce bandwidth and traffic control rules?A . Threat EmulationB . Access ControlC . QoSD . Threat PreventionView AnswerAnswer: C Explanation: Check Point's QoS Solution QoS is a policy-based QoS management solution from Check Point Software Technologies Ltd., satisfies your needs for a bandwidth management...
Which options are given on features, when editing a Role on Gaia Platform?
Which options are given on features, when editing a Role on Gaia Platform?A . Read/Write, Read OnlyB . Read/Write, Read only, NoneC . Read/Write, NoneD . Read Only, NoneView AnswerAnswer: B Explanation: Roles Role-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator can allow Gaia...
Which application should you use to install a contract file?
Which application should you use to install a contract file?A . SmartView MonitorB . WebUIC . SmartUpdateD . SmartProvisioningView AnswerAnswer: C Explanation: Using SmartUpdate: If you already use an NGX R65 (or higher) Security Management / Provider-1 / Multi-Domain Management Server, SmartUpdate allows you to import the service contract file that...