How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A

August 17, 2023 No Comments READ MORE +

What API command can he use in the script to achieve the requirement?

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address> B. add hostname <New HostName> ip-address <ip address> C. set host name <New...

August 17, 2023 No Comments READ MORE +

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol C. Source address, Destination address, Source port, Destination port D. Source address,...

August 17, 2023 No Comments READ MORE +

Session unique identifiers are passed to the web api using which http header option?

Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C

August 16, 2023 No Comments READ MORE +

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

August 16, 2023 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D

August 16, 2023 No Comments READ MORE +

In R81 spoofing is defined as a method of:

In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...

August 16, 2023 No Comments READ MORE +

CPM process stores objects, policies, users, administrators, licenses and management data in a database.

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQL B. Postgres SQL C. MarisDB D. SOLRView AnswerAnswer: B

August 16, 2023 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A

August 16, 2023 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

August 16, 2023 No Comments READ MORE +