CoreXL is supported when one of the following features is enabled:

CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:

July 16, 2022 No Comments READ MORE +

What is true about VRRP implementations?

What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C

July 16, 2022 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B

July 16, 2022 No Comments READ MORE +

Which view is NOT a valid CPVIEW view?

Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C

July 16, 2022 No Comments READ MORE +

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D

July 16, 2022 No Comments READ MORE +

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malwareB . Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control CentersC . Anti-Bot is the only...

July 16, 2022 No Comments READ MORE +

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A

July 15, 2022 No Comments READ MORE +

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C

July 15, 2022 No Comments READ MORE +

What are the two modes of SNX?

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client ServiceB . Network and ApplicationC . Network and LayersD . Virtual Adapter and Mobile AppView AnswerAnswer:...

July 15, 2022 No Comments READ MORE +