After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?A . Security Gateway IP-address cannot be changed without re-establishing the trustB . The Security Gateway name cannot be changed in command line without re-establishing trustC . The Security Management Server name cannot...

January 10, 2024 No Comments READ MORE +

What is the most recommended installation method for Check Point appliances?

What is the most recommended installation method for Check Point appliances?A . SmartUpdate installationB . DVD media created with Check Point ISOMorphicC . USB media created with Check Point ISOMorphicD . Cloud based installationView AnswerAnswer: C

January 9, 2024 No Comments READ MORE +

In the Check Point Security Management Architecture, which component(s) can store logs?

In the Check Point Security Management Architecture, which component(s) can store logs?A . SmartConsoleB . Security Management Server and Security GatewayC . Security Management ServerD . SmartConsole and Security Management ServerView AnswerAnswer: B

January 9, 2024 No Comments READ MORE +

Identity Awareness allows the Security Administrator to configure network access based on which of the following?

Identity Awareness allows the Security Administrator to configure network access based on which of the following?A . Name of the application, identity of the user, and identity of the machineB . Identity of the machine, username, and certificateC . Network location, identity of a user, and identity of a machineD...

January 9, 2024 No Comments READ MORE +

Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.

Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.A . DownB . No ResponseC . InactiveD . FailedView AnswerAnswer: A

January 9, 2024 No Comments READ MORE +

Which of the following is considered to be the more secure and preferred VPN authentication method?

Which of the following is considered to be the more secure and preferred VPN authentication method?A . PasswordB . CertificateC . MD5D . Pre-shared secretView AnswerAnswer: B

January 9, 2024 No Comments READ MORE +

Is it possible to have more than one administrator connected to a Security Management Server at once?

Is it possible to have more than one administrator connected to a Security Management Server at once?A . Yes, but only if all connected administrators connect with read-only permissions.B . Yes, but objects edited by one administrator will be locked for editing by others until the session is published.C ....

January 9, 2024 No Comments READ MORE +

Which statement best describes this Secure Internal Communication (SIC)?

The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal Communication (SIC)? A. After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed...

January 9, 2024 No Comments READ MORE +

How many users can have read/write access in Gaia Operating System at one time?

How many users can have read/write access in Gaia Operating System at one time?A . OneB . ThreeC . TwoD . InfiniteView AnswerAnswer: A Explanation: if another user has r/w access, you need to use "lock database override" or "unlock database" to claim r/w access. Ref: https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/162435

January 8, 2024 No Comments READ MORE +

Fill in the blank: ____________ is the Gaia command that turns the server off.

Fill in the blank: ____________ is the Gaia command that turns the server off.A . sysdownB . exitC . haltD . shut-downView AnswerAnswer: C

January 8, 2024 No Comments READ MORE +