Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . AcceptB . DropC . NATD . NoneView AnswerAnswer: D
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port OverflowB . Local Interface SpoofingC . Suspicious Activity MonitoringD . Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...
Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265B . TCP port 265C . UDP port 256D . TCP port 256View AnswerAnswer: D Explanation: Full synchronization between cluster members is handled by Firewall Kernel using TCP port 256 by...
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, ProtocolB . Source MAC address, Destination MAC address, Source port, Destination port, ProtocolC . Source address, Destination address, Source port, Destination portD . Source address,...
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
Connections to the Check Point R81 Web API use what protocol?
Connections to the Check Point R81 Web API use what protocol?A . HTTPSB . RPCC . VPND . SICView AnswerAnswer: A Explanation: Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on...
CoreXL is supported when one of the following features is enabled:
CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: CoreXL is supported when one of the following features is enabled: IPS. CoreXL does not support Check Point Suite with these features: Route-based VPN, IPv6, Overlapping...
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstatB . fw ctl affinity Cl Ca Cr CvC . fw ctl multik statD . cpinfoView AnswerAnswer: B Explanation: The fw ctl affinity -l -a...