The SmartEvent R80 Web application for real-time event monitoring is called:
The SmartEvent R80 Web application for real-time event monitoring is called:A . SmartView MonitorB . SmartEventWebC . There is no Web application for SmartEventD . SmartViewView AnswerAnswer: D Explanation: SmartView is the web application for real-time event monitoring in SmartEvent R80 and above. It provides a unified view of security...
Fill in the blank: Authentication rules are defined for ____________.
Fill in the blank: Authentication rules are defined for ____________.A . User groupsB . Users using UserCheckC . Individual usersD . All users in the databaseView AnswerAnswer: A Explanation: Authentication rules are defined for user groups rather than individual users1. To define authentication rules, you must first define users and...
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.A . DownB . No ResponseC . InactiveD . FailedView AnswerAnswer: A Explanation: When tunnel test packets no longer invoke a response, SmartView Monitor displays Down for the given...
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?A . ThreatWikiB . Whitelist FilesC . AppWikiD . IPS ProtectionsView AnswerAnswer: A Explanation: ThreatWiki is a tool that provides...
Check Point ClusterXL Active/Active deployment is used when:
Check Point ClusterXL Active/Active deployment is used when:A . Only when there is Multicast solution set upB . There is Load Sharing solution set upC . Only when there is Unicast solution set upD . There is High Availability solution set upView AnswerAnswer: B Explanation: Check Point ClusterXL Active/Active deployment...
What command should you use?
You want to store the GAiA configuration in a file for later reference. What command should you use?A . write mem <filename>B . show config -f <filename>C . save config -o <filename>D . save configuration <filename>View AnswerAnswer: D Explanation: The correct answer is D because the command save configuration <filename>...
Using ClusterXL, what statement is true about the Sticky Decision Function?
Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementationsB . All connections are processed and synchronized by the pivotC . Is configured using cpconfigD . Is only relevant when using SecureXLView AnswerAnswer: A Explanation: The Sticky Decision Function (SDF)...
Which command shows the installed licenses?
Which command shows the installed licenses?A . cplic printB . print cplicC . fwlic printD . show licensesView AnswerAnswer: A Explanation: The command that shows the installed licenses is cplic print. This command displays the license information on a Check Point server or Security Gateway. It shows the license type,...
What command would show the API server status?
What command would show the API server status?A . cpm statusB . api restartC . api statusD . show api statusView AnswerAnswer: D Explanation: The command api status shows the API server status, including whether it is enabled or not, the port number, and the API version1. Reference: Check Point...
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?A . All options stop Check Point processesB . backupC . migrate exportD . snapshotView AnswerAnswer: D Explanation: The snapshot option would allow you to make a backup copy...