How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A
What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address> B. add hostname <New HostName> ip-address <ip address> C. set host name <New...
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....
Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D
In R81 spoofing is defined as a method of:
In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...
CPM process stores objects, policies, users, administrators, licenses and management data in a database.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQL B. Postgres SQL C. MarisDB D. SOLRView AnswerAnswer: B
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A
Which command shows actual allowed connections in state table?
Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B