How can they solve this problem and stabilize the tunnel?

John is the Mega Corp Security Administrator, and is using Check Point R71. Malcolm is the Security Administrator of a partner company and is using a different vendor's product and both have to build a VPN tunnel between their companies. Both are using clusters with Load Sharing for their firewalls...

May 21, 2019 No Comments READ MORE +

What is the problem and how do you make the VPN use the VTI tunnels?

You have three Gateways in a mesh community. Each gateway's VPN Domain is their internal network as defined on the Topology tab setting All IP Addresses behind Gateway based on Topology information. You want to test the route-based VPN, so you created VTIs among the Gateways and created static route...

May 20, 2019 No Comments READ MORE +

Which of the following commands can provide the most complete restore of an R76 configuration?

Which of the following commands can provide the most complete restore of an R76 configuration?A . upgrade importB . fwm dbimport -p <export file>C . cpconfigD . cpinfo -recoverView AnswerAnswer: A

May 20, 2019 No Comments READ MORE +

In a R76 Cluster XL Load Sharing configuration, which type of ARP related problem can force the use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and switches?

In a R76 Cluster XL Load Sharing configuration, which type of ARP related problem can force the use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and switches?A . Multicast MAC address response to a Unicast IP requestB . Unicast MAC address response to a Multicast...

May 20, 2019 No Comments READ MORE +

Which of the following configurations is MOST appropriate for Jerry?

Jerry is concerned that a denial-oF. service (DoS) attack may affect his VPN Communities. He decides to implement IKE DoS protection. Jerry needs to minimize the performance impact of implementing this new protection. Which of the following configurations is MOST appropriate for Jerry?A . Set Support IKE DoS protection from...

May 20, 2019 No Comments READ MORE +

If the number of kernel instances for Core XL shown is 6, how many cores are in the physical machine?

If the number of kernel instances for Core XL shown is 6, how many cores are in the physical machine?A . 6B . 8C . 4D . 12View AnswerAnswer: B

May 20, 2019 No Comments READ MORE +

To clean the system of all events, you should delete the files in which folder(s)?

To clean the system of all events, you should delete the files in which folder(s)?A . $RTDIR/distrib and $RTDIR/events_dbB . $RTDIR/events_dbC . $FWDIR/distrib_db and $FWDIR/eventsD . $FWDIR/distribView AnswerAnswer: A

May 20, 2019 No Comments READ MORE +

What can Stephanie do to achieve her goal?

Stephanie wants to reduce the encryption overhead and improve performance for her mesh VPN Community. The Advanced VPN Properties screen below displays adjusted page settings: What can Stephanie do to achieve her goal?A . Check the box "Use Perfect Forward Secrecy"B . Change the setting "Use DiffiC . Hellman group"...

May 20, 2019 No Comments READ MORE +

Surprisingly, Peter is not able to approve the proposal because the system does not permit him to do so?

John is the Multi Corp Security Administrator. If he suggests a change in the firewall configuration, he must submit his proposal to David, a security manager. One day David is out of the office and john submits his proposal to peter. Surprisingly, Peter is not able to approve the proposal...

May 20, 2019 No Comments READ MORE +

When upgrading Check Point products in a distributed environment, in which order should you upgrade these components?

When upgrading Check Point products in a distributed environment, in which order should you upgrade these components? 1 GUI Client 2 Security Management Server 3 Security GatewayA . 3, 2, 1B . 1, 2, 3C . 3, 1, 2D . 2, 3, 1View AnswerAnswer: D

May 20, 2019 No Comments READ MORE +