Which CLI command will reset the IPS pattern matcher statistics?
Which CLI command will reset the IPS pattern matcher statistics?A . ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats resetView AnswerAnswer: D
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCP B. infoview C. cpinfo D. fw cpinfoView AnswerAnswer: C
Which statement is correct about the Sticky Decision Function?
Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator card B. Does not support SPI’s when configured for Load Sharing C. It is automatically disabled if the Mobile Access Software Blade is enabled on the...
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______ .
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______ .A . TCP 18211 B. TCP 257 C. TCP 4433 D. TCP 443View AnswerAnswer: D
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routing B. Failovers C. Asymmetric routing D. Anti-SpoofingView AnswerAnswer: C
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command. B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast. C. Machines in a ClusterXL High Availability...
Which command can you use to verify the number of active concurrent connections?
Which command can you use to verify the number of active concurrent connections?A . fw conn all B. fw ctl pstat C. show all connections D. show connectionsView AnswerAnswer: B
What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender. B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2 B. 1 C. 4 D. 6View AnswerAnswer: A
Where you can see and search records of action done by R81 SmartConsole administrators?
Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open Audit Log View” C. In SmartAuditLog View D. In Smartlog, all logsView AnswerAnswer: B