Which of the following authentication methods ARE NOT used for Mobile Access?
Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D Explanation: Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm
In R80.10, how do you manage your Mobile Access Policy?
In R80.10, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...
What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...
Which statement is NOT TRUE about Delta synchronization?
Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161B . Using UDP Multicast or Broadcast on port 8116C . Quicker than Full syncD . Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm
Which TCP-port does CPM process listen to?
Which TCP-port does CPM process listen to?A . 18191B . 18190C . 8983D . 19009View AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/downloads/products/r80.10-security-management-architectureÂoverview.pdf
What is not a component of Check Point SandBlast?
What is not a component of Check Point SandBlast?A . Threat EmulationB . Threat SimulatorC . Threat ExtractionD . Threat CloudView AnswerAnswer: B
Which packet info is ignored with Session Rate Acceleration?
Which packet info is ignored with Session Rate Acceleration?A . source port rangesB . source ipC . source portD . same info from Packet Acceleration is usedView AnswerAnswer: C Explanation: Reference: http://trlj.blogspot.com/2015/10/check-point-acceleration.html
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.
Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C