- All Exams Instant Download
Which of the following log files contains verbose information regarding the negotiation process and other encryption failures?
Which of the following log files contains verbose information regarding the negotiation process and other encryption failures?A . iked.elgB . ike.elgC . vpn.elgD . vpnd.elgView AnswerAnswer: D
Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
You intend to upgrade a Check Point Gateway from R65 to R76. To avoid problems, you decide to back up the Gateway. Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?A . snapshotB . database revisionC . backupD...
If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?
If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?A . Consolidation PolicyB . Log Consolidator PolicyC . Log Sequence PolicyD . Report PolicyView AnswerAnswer: A
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?A . Use the URI resource to block Java codeB . Use CVP in the URI resource to block Java codeC . Use the URI resource to strip applet tagsD . Use the...
The following graphic illustrates which command being issued on Secure Platform?
The following graphic illustrates which command being issued on Secure Platform? A . fwaccel statsB . fw accel statsC . fw Secure XL statsD . fwSecure XL statsView AnswerAnswer: A
What is the behavior of Cluster XL in a High Availability environment?
What is the behavior of Cluster XL in a High Availability environment?A . The active member responds to the virtual address and is the only member that passes traffic.B . The active member responds to the virtual address and, using sync network forwarding, both members pass traffic.C . Both members...
What cluster mode is represented in this case?
What cluster mode is represented in this case? A . 3rd party clusterB . Load Sharing (multicast mode)C . Load Sharing Unicast (Pivot) modeD . HA (New mode)View AnswerAnswer: B
By what category can this priority be defined?
Where multiple Smart Directory servers exist in an organization, a query from one of the clients for user information is made to the servers based on a priority. By what category can this priority be defined?A . Gateway or DomainB . Location or Account UnitC . Location or DomainD ....
One profile in Smart Provisioning can update:
One profile in Smart Provisioning can update:A . Potentially hundreds and thousands of gateways.B . Only Clustered Gateways.C . Specific gateways.D . Profiles are not used for updating, just reporting.View AnswerAnswer: A
__________ is a proprietary Check Point protocol. It is the basis for Check Point Cluster XL inter-module communication.
__________ is a proprietary Check Point protocol. It is the basis for Check Point Cluster XL inter-module communication.A . HA OPCODEB . RDPC . CKPPD . CCPView AnswerAnswer: D