Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routing B. Failovers C. Asymmetric routing D. Anti-SpoofingView AnswerAnswer: C

August 22, 2023 No Comments READ MORE +

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset everyA . 15 sec B. 60 sec C. 5 sec D. 30 secView AnswerAnswer: B

August 22, 2023 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A

August 22, 2023 No Comments READ MORE +

Which application would you use?

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C

August 22, 2023 No Comments READ MORE +

Which command can you use to verify the number of active concurrent connections?

Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B

August 22, 2023 No Comments READ MORE +

In R81, how do you manage your Mobile Access Policy?

In R81, how do you manage your Mobile Access Policy?A . Through the Unified Policy B. Through the Mobile Console C. From SmartDashboard D. From the Dedicated Mobility TabView AnswerAnswer: A

August 21, 2023 No Comments READ MORE +

What is true about the IPS-Blade?

What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention Policy B. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. In R81, IPS Exceptions cannot be attached to “all rules” D. In R81, the GeoPolicy...

August 21, 2023 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicast B. cphaconf set_ccp multicast C. cphaconf set_ccp no_broadcast D. cphaprob set_ccp no_broadcastView AnswerAnswer: B

August 21, 2023 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C

August 21, 2023 No Comments READ MORE +

What are the three components for Check Point Capsule?

What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect D. Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D

August 20, 2023 No Comments READ MORE +