What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful ModeB . VPN Routing ModeC . Wire ModeD . Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C
Which method below is NOT one of the ways to communicate using the Management API’s?
Which method below is NOT one of the ways to communicate using the Management API’s?A . Typing API commands using the “mgmt_cli” commandB . Typing API commands from a dialog box inside the SmartConsole GUI applicationC . Typing API commands using Gaia’s secure shell(clish)19+D . Sending API commands over an...
Connections to the Check Point R81 Web API use what protocol?
Connections to the Check Point R81 Web API use what protocol?A . HTTPSB . RPCC . VPND . SICView AnswerAnswer: A
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruptionB . LDAP conflictsC . Traffic issuesD . Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50%B . 75%C . 80%D . 15%View AnswerAnswer: D
Which of the following authentication methods ARE NOT used for Mobile Access?
Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:A . 18210B . 18184C . 257D . 18191View AnswerAnswer: B