How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) imagesB . images are chosen by administrator during installationC . as many as licensed forD . the newest imageView AnswerAnswer: A Explanation: The Check Point TE appliance in Recommended Mode includes 2(OS) images. One image...

December 13, 2023 No Comments READ MORE +

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______.

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______.A . TCP Port 18190B . TCP Port 18209C . TCP Port 19009D . TCP Port 18191View AnswerAnswer: D Explanation: Check Point Central Deployment Tool (CDT) communicates with the Security Gateway /...

December 13, 2023 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D Explanation: SmartEvent Processes use two Check Point Protocols: ELA (Event Log Agent) and CPLOG (Check Point Log). ELA collects logs...

December 13, 2023 No Comments READ MORE +

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...

December 12, 2023 No Comments READ MORE +

How can you enable them?

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...

December 12, 2023 No Comments READ MORE +

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . Security GatewayE . SmartEventView AnswerAnswer: D Explanation: When doing a Stand-Alone Installation, you would install the...

December 12, 2023 No Comments READ MORE +

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A Explanation: You can select the file types that are sent for...

December 12, 2023 No Comments READ MORE +

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...

December 12, 2023 No Comments READ MORE +

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?A . Big lB . Little oC . Little iD . Big OView AnswerAnswer: A Explanation: The inspection point Big l...

December 12, 2023 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B Explanation: When requiring certificates for mobile devices, the authentication method should be set to one of...

December 12, 2023 No Comments READ MORE +