What is not a component of Check Point SandBlast?
What is not a component of Check Point SandBlast?A . Threat EmulationB . Threat SimulatorC . Threat ExtractionD . Threat CloudView AnswerAnswer: B Explanation: Threat Simulator is not a component of Check Point SandBlast. Check Point SandBlast is a solution that provides advanced protection against zero-day threats using four components:...
What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDFC . With SDF enabled, only ClusterXL in legacy mode is supportedD . With SDF enabled, you can...
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D Explanation: The least ideal Synchronization Status for Security Management Server High Availability deployment is Collision. This status indicates that both members have modified the...
Which command shows actual allowed connections in state table?
Which command shows actual allowed connections in state table?A . fw tab Ct StateTableB . fw tab Ct connectionsC . fw tab Ct connectionD . fw tab connectionsView AnswerAnswer: B Explanation: The correct command to show actual allowed connections in the state table is option B: fw tab Ct connections....
Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful ModeB . VPN Routing ModeC . Wire ModeD . Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...
fwssd is a child process of which of the following Check Point daemons?
fwssd is a child process of which of the following Check Point daemons?A . fwdB . cpwdC . fwmD . cpdView AnswerAnswer: A Explanation: fwssd is a child process of fwd, which is the firewall daemon that handles policy installation, logging, and state synchronization. cpwd is the watchdog process that...
What Factor preclude Secure XL Templating?
What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted ConnectionsB . IPSC . ClusterXL in load sharing ModeD . CoreXLView AnswerAnswer: A Explanation: SecureXL Templating is a feature that accelerates the processing of packets that belong to the same connection or session by creating a template for the first...
What command verifies that the API server is responding?
What command verifies that the API server is responding?A . api statB . api statusC . show api_statusD . app_get_statusView AnswerAnswer: B Explanation: The API server is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST...