After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?A . Security Gateway IP-address cannot be changed without re-establishing the trustB . The Security Gateway name cannot be changed in command line without re-establishing trustC . The Security Management Server name cannot...
What is the most recommended installation method for Check Point appliances?
What is the most recommended installation method for Check Point appliances?A . SmartUpdate installationB . DVD media created with Check Point ISOMorphicC . USB media created with Check Point ISOMorphicD . Cloud based installationView AnswerAnswer: C
In the Check Point Security Management Architecture, which component(s) can store logs?
In the Check Point Security Management Architecture, which component(s) can store logs?A . SmartConsoleB . Security Management Server and Security GatewayC . Security Management ServerD . SmartConsole and Security Management ServerView AnswerAnswer: B
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?A . Name of the application, identity of the user, and identity of the machineB . Identity of the machine, username, and certificateC . Network location, identity of a user, and identity of a machineD...
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.A . DownB . No ResponseC . InactiveD . FailedView AnswerAnswer: A
Which of the following is considered to be the more secure and preferred VPN authentication method?
Which of the following is considered to be the more secure and preferred VPN authentication method?A . PasswordB . CertificateC . MD5D . Pre-shared secretView AnswerAnswer: B
Is it possible to have more than one administrator connected to a Security Management Server at once?
Is it possible to have more than one administrator connected to a Security Management Server at once?A . Yes, but only if all connected administrators connect with read-only permissions.B . Yes, but objects edited by one administrator will be locked for editing by others until the session is published.C ....
Which statement best describes this Secure Internal Communication (SIC)?
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal Communication (SIC)? A. After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed...
How many users can have read/write access in Gaia Operating System at one time?
How many users can have read/write access in Gaia Operating System at one time?A . OneB . ThreeC . TwoD . InfiniteView AnswerAnswer: A Explanation: if another user has r/w access, you need to use "lock database override" or "unlock database" to claim r/w access. Ref: https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/162435
Fill in the blank: ____________ is the Gaia command that turns the server off.
Fill in the blank: ____________ is the Gaia command that turns the server off.A . sysdownB . exitC . haltD . shut-downView AnswerAnswer: C