How many images are included with Check Point TE appliance in Recommended Mode?
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) imagesB . images are chosen by administrator during installationC . as many as licensed forD . the newest imageView AnswerAnswer: A Explanation: The Check Point TE appliance in Recommended Mode includes 2(OS) images. One image...
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______.
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______.A . TCP Port 18190B . TCP Port 18209C . TCP Port 19009D . TCP Port 18191View AnswerAnswer: D Explanation: Check Point Central Deployment Tool (CDT) communicates with the Security Gateway /...
Which two of these Check Point Protocols are used by SmartEvent Processes?
Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D Explanation: SmartEvent Processes use two Check Point Protocols: ELA (Event Log Agent) and CPLOG (Check Point Log). ELA collects logs...
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . Security GatewayE . SmartEventView AnswerAnswer: D Explanation: When doing a Stand-Alone Installation, you would install the...
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A Explanation: You can select the file types that are sent for...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?A . Big lB . Little oC . Little iD . Big OView AnswerAnswer: A Explanation: The inspection point Big l...
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B Explanation: When requiring certificates for mobile devices, the authentication method should be set to one of...