What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...
What command would you use to restore this backup?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D Explanation: The command migrate import can be used to restore a backup of Check Point configurations without...
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2B . 1C . 4D . 6View AnswerAnswer: A Explanation: The least amount of CPU cores required to enable CoreXL is 2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU...
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....
The Event List within the Event tab contains:
The Event List within the Event tab contains:A . a list of options available for running a query.B . the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.C . events generated by a query.D . the details of a...
Which statement is NOT TRUE about Delta synchronization?
Which statement is NOT TRUE about Delta synchronization?A . Using UDP Multicast or Broadcast on port 8161B . Using UDP Multicast or Broadcast on port 8116C . Quicker than Full syncD . Transfers changes in the Kernel tables between cluster members.View AnswerAnswer: A Explanation: The statement that is not true...
In R81, how do you manage your Mobile Access Policy?
In R81, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A Explanation: In R81, you can manage your Mobile Access Policy through the Unified Policy. The Unified Policy is a...
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQLB . Postgres SQLC . MarisDBD . SOLRView AnswerAnswer: B Explanation: CPM process stores objects, policies, users, administrators, licenses and management data in a Postgres SQL database. This database is located in...
In R81 spoofing is defined as a method of:
In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...