What would be the correct syntax to create a capture file to a filename called monitor. out?
Check Point support has asked Tony for a firewall capture of accepted packets. What would be the correct syntax to create a capture file to a filename called monitor. out?A . Run fw monitor -e "accept;" -f monitor.outB . Run fw monitor -e "accept;" -c monitor.outC . Run fw monitor...
A Fast Path Upgrade of a cluster:
A Fast Path Upgrade of a cluster:A . Upgrades all cluster members except one at the same time.B . Treats each individual cluster member as an individual gateway.C . Is not a valid upgrade method in R76.D . Is only supported in major releases (R70 to R71, R75 to R76).View...
The set of rules that governs the types of objects in the directory and their associated attributes is called the:
The set of rules that governs the types of objects in the directory and their associated attributes is called the:A . LDAP PolicyB . SchemaC . Access Control ListD . Smart DatabaseView AnswerAnswer: B
When using Connecter with Endpoint Security Policies, what option is not available when configuring DAT enforcement?
When using Connecter with Endpoint Security Policies, what option is not available when configuring DAT enforcement?A . Maximum DAT file versionB . Maximum DAT file ageC . Minimum DAT file versionD . Oldest DAT file timestampView AnswerAnswer: A
Which of the following commands should you run to back up the Smart Event data base?
When migrating the Smart Event data base from one server to another, the first step is to back up the files on the original server. Which of the following commands should you run to back up the Smart Event data base?A . migrate exportB . snapshotC . backupD . eva_db_backupView...
Which of the following platforms does NOT support Secure XL?
Which of the following platforms does NOT support Secure XL?A . Power-1 ApplianceB . IP ApplianceC . UTM-1 ApplianceD . UNIXView AnswerAnswer: D
Reinstall the Security Policy.
Reinstall the Security Policy.A . 3, 2, 1, 4B . 2, 4, 3, 1C . 1, 3, 2, 4D . 2, 3, 1, 4E . 1, 2, 3, 4View AnswerAnswer: D
In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?
In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?A . Sglondon_1, because it is up again, sglondon_2 took over during rebootB . Sglondon_2 because I has highest IPC . Sglondon_2 because it has highest priorityD . Sglondon_1...
Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
You intend to upgrade a Check Point Gateway from R65 to R76. To avoid problems, you decide to back up the Gateway. Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?A . snapshotB . database revisionC . backupD...
Which of these is a type of acceleration in Secure XL?
Which of these is a type of acceleration in Secure XL?A . FTPB . connection rateC . GRED . QoSView AnswerAnswer: B