Which is a suitable command to check whether Drop Templates are activated or not?
Which is a suitable command to check whether Drop Templates are activated or not?A . fw ctl get int activate_drop_templatesB . fwaccel statC . fwaccel statsD . fw ctl templates CdView AnswerAnswer: B Explanation: The command fwaccel stat shows the status of SecureXL, including whether Drop Templates are enabled or...
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:A . Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from...
Which of the following describes how Threat Extraction functions?
Which of the following describes how Threat Extraction functions?A . Detect threats and provides a detailed report of discovered threatsB . Proactively detects threatsC . Delivers file with original contentD . Delivers PDF versions of original files with active content removedView AnswerAnswer: D Explanation: Threat Extraction delivers PDF versions of...
The SIC Status “Unknown” means
The SIC Status “Unknown” meansA . There is connection between the gateway and Security Management Server but it is not trusted.B . The secure communication is established.C . There is no connection between the gateway and Security Management Server.D . The Security Management Server can contact the gateway, but cannot...
Which path below is available only when CoreXL is enabled?
Which path below is available only when CoreXL is enabled?A . Slow pathB . Firewall pathC . Medium pathD . Accelerated pathView AnswerAnswer: C Explanation: The path that is available only when CoreXL is enabled is the medium path. The medium path is used to handle packets that require deeper...
When configuring LDAP User Directory integration, Changes applied to a User Directory template are:
When configuring LDAP User Directory integration, Changes applied to a User Directory template are:A . Reflected immediately for all users who are using template.B . Not reflected for any users unless the local user template is changed.C . Reflected for all users who are using that template and if the...
Which of the following is an authentication method used for Identity Awareness?
Which of the following is an authentication method used for Identity Awareness?A . SSLB . Captive PortalC . PKID . RSAView AnswerAnswer: B Explanation: Captive Portal is an authentication method used for Identity Awareness4. Captive Portal is a web-based authentication method that redirects users to a browser-based login page when...
Which two of these Check Point Protocols are used by?
Which two of these Check Point Protocols are used by? A. ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: B Explanation: The two Check Point Protocols that are used by are FWD and LEA567. FWD is the Firewall Daemon that handles communication...
To enforce the Security Policy correctly, a Security Gateway requires:
To enforce the Security Policy correctly, a Security Gateway requires:A . a routing tableB . awareness of the network topologyC . a Demilitarized ZoneD . a Security Policy installView AnswerAnswer: B Explanation: To enforce the Security Policy correctly, a Security Gateway requires awareness of the network topology. This means that...
Which of the following is NOT an option to calculate the traffic direction?
Which of the following is NOT an option to calculate the traffic direction?A . IncomingB . InternalC . ExternalD . OutgoingView AnswerAnswer: D Explanation: The options to calculate the traffic direction are Incoming, Internal, and External3. Outgoing is not an option. Incoming traffic is traffic that enters the Security Gateway...