Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265 B. TCP port 265 C. UDP port 256 D. TCP port 256View AnswerAnswer: D Explanation: Synchronization works in two modes: Full Sync transfers all Security Gateway kernel table information from...
How many options are available to calculate the traffic direction?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; API B. 3 Incoming; Outgoing; Network C. 2 Internal; External...
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50% B. 75% C. 80% D. 15%View AnswerAnswer: D
What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1 B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF C. With SDF enabled, only ClusterXL in legacy mode is supported D. With SDF enabled, you can...
What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender. B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
To fully enable Dynamic Dispatcher on a Security Gateway:
To fully enable Dynamic Dispatcher on a Security Gateway:A . run fw ctl multik set_mode 9 in Expert mode and then Reboot. B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu. C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save,...
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:A . 18210 B. 18184 C. 257 D. 18191View AnswerAnswer: B
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A