CoreXL is supported when one of the following features is enabled:
CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:
What is true about VRRP implementations?
What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B
Which view is NOT a valid CPVIEW view?
Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malwareB . Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control CentersC . Anti-Bot is the only...
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C
What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...