Which of the following statements is TRUE about R80 management plug-ins?
Which of the following statements is TRUE about R80 management plug-ins?A . The plug-in is a package installed on the Security Gateway.B . Installing a management plug-in requires a Snapshot, just like any upgrade process.C . A management plug-in interacts with a Security Management Server to provide new features and...
Which feature is NOT provided by all Check Point Mobile Access solutions?
Which feature is NOT provided by all Check Point Mobile Access solutions?A . Support for IPv6B . Granular access controlC . Strong user authenticationD . Secure connectivityView AnswerAnswer: A Explanation: Types of Solutions All of Check Point's Remote Access solutions provide: - Enterprise-grade, secure connectivity to corporate resources. - Strong...
How will you describe the new “Publish” button in R80 Management Console?
You are the senior Firewall administrator for ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house overview of the new features of Check Point R80 Management to the other administrators in ABC Corp. How will you...
Which of the following is NOT a component of a Distinguished Name?
Which of the following is NOT a component of a Distinguished Name?A . Organizational UnitB . CountryC . Common NameD . User containerView AnswerAnswer: D Explanation: Distinguished Name Components CN=common name, OU=organizational unit, O=organization, L=locality, ST=state or province, C=country name Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . EditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: To create a new permission profile:
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?A . Machine Hide NATB . Address Range Hide NATC . Network Hide NATD . Machine Static NATView AnswerAnswer: BC Explanation: SmartDashboard organizes the automatic NAT rules in this order:
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?A . Machine Hide NATB . Address Range Hide NATC . Network Hide NATD . Machine Static NATView AnswerAnswer: BC Explanation: SmartDashboard organizes the automatic NAT rules in this order:
By default, which port does the WebUI listen on?
By default, which port does the WebUI listen on? B. 4434 C. 443 D. 8080View AnswerAnswer: C Explanation: To configure Security Management Server on Gaia: - Open a browser to the WebUI: https://<Gaia management IP address> Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=documents/R80/CP_R80_Gaia_IUG/132120
The following graphic shows:
The following graphic shows: A . View from SmartLog for logs initiated from source address 10.1.1.202B . View from SmartView Tracker for logs of destination address 10.1.1.202C . View from SmartView Tracker for logs initiated from source address 10.1.1.202D . View from SmartView Monitor for logs initiated from source address...
Which command should he use in CLI?
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server Operating System. He can do this via WebUI or via CLI. Which command should he use in CLI?A . remove database lockB . The database feature has one command: lock database override.C . override database...