Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265B . TCP port 265C . UDP port 256D . TCP port 256View AnswerAnswer: D Explanation: Synchronization works in two modes: Full Sync transfers all Security Gateway kernel table information from...
Which command will allow you to see the interface status?
Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/ CP_R80.10_MobileAccess_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/ EN/CP_R80.10_MobileAccess_AdminGuide/41587
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R80, IPS is managed by the Threat Prevention PolicyB . In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R80, IPS Exceptions cannot be attached to “all rules”D . In R80, the GeoPolicy...
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted ConnectionsB . IPSC . ClusterXL in load sharing ModeD . CoreXLView AnswerAnswer: A
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malwareB . Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control CentersC . Anti-Bot is the only...
Which packet info is ignored with Session Rate Acceleration?
Which packet info is ignored with Session Rate Acceleration?A . source port rangesB . source ipC . source portD . same info from Packet Acceleration is usedView AnswerAnswer: C Explanation: Reference: http://trlj.blogspot.com/2015/10/check-point-acceleration.html
Your manager asked you to check the status of SecureXL, and its enable templates and features, what command will you use to provide such information to manager?
Your manager asked you to check the status of SecureXL, and its enable templates and features, what command will you use to provide such information to manager?A . fw accel statB . fwaccel statC . fw acces statsD . fwaccel statsView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:A . Allow GUI Client and management server to communicate via TCP Port 19001B . Allow GUI...