Connections to the Check Point R80 Web API use what protocol?

Connections to the Check Point R80 Web API use what protocol?A . HTTPSB . RPCC . VPND . SICView AnswerAnswer: A

March 14, 2019 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...

March 3, 2019 No Comments READ MORE +

Which command would disable a Cluster Member permanently?

Which command would disable a Cluster Member permanently?A . clusterXL_admin downB . cphaprob_admin downC . clusterXL_admin down-pD . set clusterXL down-pView AnswerAnswer: C

March 2, 2019 No Comments READ MORE +

CoreXL is supported when one of the following features is enabled:

CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: Explanation: CoreXL does not support Check Point Suite with these features: Check Point QoS (Quality of Service) Route-based VPN IPv6 on IPSO Overlapping NAT Reference: https://sc1.checkpoint.com/documents/R76/...

February 12, 2019 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576

February 8, 2019 No Comments READ MORE +

What is not a component of Check Point SandBlast?

What is not a component of Check Point SandBlast?A . Threat EmulationB . Threat SimulatorC . Threat ExtractionD . Threat CloudView AnswerAnswer: B

January 28, 2019 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D

January 21, 2019 No Comments READ MORE +

Identify the API that is not supported by Check Point currently.

Identify the API that is not supported by Check Point currently.A . R80 Management APIB . Identity Awareness Web Services APIC . Open REST APID . OPSEC SDKView AnswerAnswer: C

January 10, 2019 No Comments READ MORE +

Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.

Fill in the blank: The command ___________ provides the most complete restoration of a R80 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

How many options are available to calculate the traffic direction?

To help SmartEvent determine whether events originated internally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD . 4...

December 28, 2018 No Comments READ MORE +