You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...

January 27, 2023 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A

January 26, 2023 No Comments READ MORE +

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009 B. TCP Port 18190 C. TCP Port 18191 D. TCP Port...

January 26, 2023 No Comments READ MORE +

Which CLI command will reset the IPS pattern matcher statistics?

Which CLI command will reset the IPS pattern matcher statistics?A . ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats resetView AnswerAnswer: D

January 26, 2023 No Comments READ MORE +

What is the difference between an event and a log?

What is the difference between an event and a log?A . Events are generated at gateway according to Event Policy B. A log entry becomes an event when it matches any rule defined in Event Policy C. Events are collected with SmartWorkflow form Trouble Ticket systems D. Log and Events...

January 26, 2023 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted Connections B. IPS C. ClusterXL in load sharing Mode D. CoreXLView AnswerAnswer: A

January 26, 2023 No Comments READ MORE +

CPM process stores objects, policies, users, administrators, licenses and management data in a database.

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQL B. Postgres SQL C. MarisDB D. SOLRView AnswerAnswer: B

January 26, 2023 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A

January 26, 2023 No Comments READ MORE +

Where you can see and search records of action done by R81 SmartConsole administrators?

Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open Audit Log View” C. In SmartAuditLog View D. In Smartlog, all logsView AnswerAnswer: B

January 26, 2023 No Comments READ MORE +

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCP B. infoview C. cpinfo D. fw cpinfoView AnswerAnswer: C

January 26, 2023 No Comments READ MORE +