When defining an Organizational Unit, which of the following are NOT valid object categories?

When defining an Organizational Unit, which of the following are NOT valid object categories?A . DomainsB . ResourcesC . UsersD . ServicesView AnswerAnswer: A

May 25, 2019 No Comments READ MORE +

Which of the following is NOT a recommended use for this method?

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?A . When accuracy in detecting identity is crucialB . Identity based enforcement for non-AD users (non-Windows and guest users)C . Protecting highly sensitive serversD...

May 25, 2019 No Comments READ MORE +

Which technology should you explain to the executives?

Your organization maintains several IKE VPN's. Executives in your organization want to know which mechanism Security Gateway R76 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?A . Digital signaturesB . Certificate Revocation ListsC . Key-exchange protocolsD . Application IntelligenceView AnswerAnswer: A

May 25, 2019 No Comments READ MORE +

For best performance in Event Correlation, you should use:

For best performance in Event Correlation, you should use:A . IP address rangesB . Large groupsC . Nothing slows down Event CorrelationD . Many objectsView AnswerAnswer: A

May 25, 2019 No Comments READ MORE +

Your organization's disaster recovery plan needs an update to the backup and restore section to reap the benefits of the new distributed R76 installation.

Your organization's disaster recovery plan needs an update to the backup and restore section to reap the benefits of the new distributed R76 installation. Your plan must meet the following required and desired objectives: Upon evaluation, your plan:A . Meets the required objective and only one desired objectiveB . Meets...

May 25, 2019 No Comments READ MORE +

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the ________ child service, which runs the security server.

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the ________ child service, which runs the security server.A . FWDB . FWSDC . In.httpdD . FWSSDView AnswerAnswer: D

May 25, 2019 No Comments READ MORE +

Which back up method does Check Point recommend before major changes, such as upgrades?

Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend before major changes, such as upgrades?A . snapshotB . upgrade exportC...

May 25, 2019 No Comments READ MORE +

A Minimal Effort Upgrade of a cluster:

A Minimal Effort Upgrade of a cluster:A . Is only supported in major releases (R70 to R71, R71 to R76).B . Is not a valid upgrade method in R76.C . Treats each individual cluster member as an individual gateway.D . Upgrades all cluster members except one at the same time.View...

May 24, 2019 No Comments READ MORE +

Check Point Clustering protocol, works on:

Check Point Clustering protocol, works on:A . UDP 500B . UDP 8116C . TCP 8116D . TCP 19864View AnswerAnswer: B

May 24, 2019 No Comments READ MORE +

Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?

Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...

May 24, 2019 No Comments READ MORE +