- All Exams Instant Download
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...
When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?
When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?A . All Account-Unit's UsersB . Only Group in BranchC . Group AgnosticD . OU Accept and select appropriate domainView AnswerAnswer: B
If you are experiencing LDAP issues, which of the following should you check?
If you are experiencing LDAP issues, which of the following should you check?A . Secure Internal Communications (SIC)B . Domain name resolutionC . Overlapping VPN DomainsD . Connectivity between the R76 Gateway and LDAP serverView AnswerAnswer: D
What do you expect to find?
You use the snapshot feature to store your Connecter SSL VPN configuration. What do you expect to find?A . Nothing; snapshot is not supported in Connector SSL VPC . The management configuration of the current product, on a management or stand-alone machineD . A complete image of the local file...
Match the VPN-related terms with their definitions:
Match the VPN-related terms with their definitions: A . A-3, B-2, C-1, D-4B . A-3, B-4, C-1, D-2C . A-3, B-2, C-4, D-1D . A-2, B-3, C-4, D-1View AnswerAnswer: C
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...
In a "zero downtime" scenario, which command do you run manually after all cluster members are upgraded?
In a "zero downtime" scenario, which command do you run manually after all cluster members are upgraded?A . cphaconf set_ccp broadcastB . cphaconf set clear_subsC . cphaconf set mc_relodD . cphaconf set_ccp multicastView AnswerAnswer: D
By default Check Point High Availability components send updates about their state every:
By default Check Point High Availability components send updates about their state every:A . 5 seconds.B . 0.5 second.C . 0.1 second.D . 1 second.View AnswerAnswer: C
Where is the encryption domain for a Smart LSM Security Gateway configured in R71?
Where is the encryption domain for a Smart LSM Security Gateway configured in R71?A . Inside the Smart LSM Security Gateway object in the Smart Dashboard GUIB . Inside the Smart LSM Security Gateway profile in the Smart Provisioning GUIC . Inside the Smart LSM Security Gateway object in the...
In Cluster XL, _______ is defined by default as a critical device.
In Cluster XL, _______ is defined by default as a critical device.A . fw.dB . protect.exeC . PROT_SRD . EXEE . FilterView AnswerAnswer: D