Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/41587
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpmB . fwm via fwdC . cpm via cpdD . fwd via cpdView AnswerAnswer: A
Which command is used to set the CCP protocol to Multicast?
Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576
Connections to the Check Point R80 Web API use what protocol?
Connections to the Check Point R80 Web API use what protocol?A . HTTPSB . RPCC . VPND . SICView AnswerAnswer: A
R80.10 management server can manage gateways with which versions installed?
R80.10 management server can manage gateways with which versions installed?A . Versions R77 and higherB . Versions R76 and higherC . Versions R75.20 and higherD . Versions R75 and higherView AnswerAnswer: C Explanation: Reference: http://dl3.checkpoint.com/paid/88/88e25b652f62aa6f59dc955e34f98d5c/CP_R80.10_ReleaseNotes.pdf?HashKey=1538443232_ff63052c2c5a68c42c47eae9e15273c8&xtn=.pdf
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset everyA . 15 secB . 60 secC . 5 secD . 30 secView AnswerAnswer: B Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm
Fill in the blank: The R80 feature ______ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R80 feature ______ permits blocking specific IP addresses for a specified time period.A . Block Port OverflowB . Local Interface SpoofingC . Suspicious Activity MonitoringD . Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
Which one is NOT correct?
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?A . Using Web ServicesB . Using Mgmt_cli toolC . Using CLISHD . Using SmartConsole GUI consoleE . Events are collected with SmartWorkflow from Trouble Ticket systemsView AnswerAnswer: E...
How many options are available to calculate the traffic direction?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD...