Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A

September 14, 2022 No Comments READ MORE +

What command will you use to provide such information to manager?

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?A . fw accel stat B. fwaccel stat C. fw acces stats D. fwaccel statsView AnswerAnswer: B

September 14, 2022 No Comments READ MORE +

The Firewall kernel is replicated multiple times, therefore:

The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is accelerated B. The Firewall can run different policies per core C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out D. The...

September 14, 2022 No Comments READ MORE +

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstat B. fw ctl affinity Cl Ca Cr Cv C. fw ctl multik stat D. cpinfoView AnswerAnswer: B

September 14, 2022 No Comments READ MORE +

In R81 spoofing is defined as a method of:

In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...

September 14, 2022 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D

September 14, 2022 No Comments READ MORE +

Which view is NOT a valid CPVIEW view?

Which view is NOT a valid CPVIEW view?A . IDA B. RAD C. PDP D. VPNView AnswerAnswer: C

September 14, 2022 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C

September 14, 2022 No Comments READ MORE +

CoreXL is supported when one of the following features is enabled:

CoreXL is supported when one of the following features is enabled:A . Route-based VPN B. IPS C. IPv6 D. Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:

September 13, 2022 No Comments READ MORE +

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself. B. SmartConsole C. SecureClient D. Security Gateway E. SmartEventView AnswerAnswer: D

September 13, 2022 No Comments READ MORE +