What process is responsible for transferring the policy file from Smart Center to the Gateway?

What process is responsible for transferring the policy file from Smart Center to the Gateway?A . FWDB . FWMC . CPRIDD . CPDView AnswerAnswer: D

April 27, 2019No CommentsREAD MORE +

What command will allow you to disable sync on a cluster firewall member?

What command will allow you to disable sync on a cluster firewall member?A . fw ctl syncstat stopB . fw ctl setsync offC . fw ctl setsync 0D . fw ctl syncstat offView AnswerAnswer: B

April 27, 2019No CommentsREAD MORE +

What is a "sticky" connection?

What is a "sticky" connection?A . A Sticky Connection is one in which a reply packet returns through the same gateway as the original packet.B . A Sticky Connection is a VPN connection that remains up until you manually bring it down.C . A Sticky Connection is a connection that...

April 27, 2019No CommentsREAD MORE +

What's happening?

John is configuring a new R76 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because this option is not available in Gateway Cluster Properties. What's happening?A . Third Party Clustering is not available for R76 Security Gateways.B . John is not using third party...

April 27, 2019No CommentsREAD MORE +

What is the correct command structure, once entering the route command, to implement OSPF successfully?

You need to publish GAiA routes using the OSPF routing protocol. What is the correct command structure, once entering the route command, to implement OSPF successfully?A . Run cpconfig utility to enable ospf routingB . - ip route ospf - ospf network1 - ospf network2C . - Enable - Configure...

April 27, 2019No CommentsREAD MORE +

When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?

When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?A . The user's rights prevent access to the protected network.B . A Desktop Policy is not configured.C . The gateway...

April 26, 2019No CommentsREAD MORE +

To verify Secure XL statistics you would use the command ________?

To verify Secure XL statistics you would use the command ________?A . fwaccel statsB . fw ctl pstatC . fwaccel topD . cphaprob statView AnswerAnswer: A

April 26, 2019No CommentsREAD MORE +

Which of the following commands shows full synchronization status?

Which of the following commands shows full synchronization status?A . fw hastatB . cphaprob -i listC . cphaprob -a ifD . fw ctl iflistView AnswerAnswer: B

April 26, 2019No CommentsREAD MORE +

What is the command to show OSPF adjacencies?

What is the command to show OSPF adjacencies?A . show ospf interfaceB . show ospf summary-addressC . show running-configD . show ip ospf neighborView AnswerAnswer: D

April 26, 2019No CommentsREAD MORE +

What is the best tool to produce a report which represents historical system information?

What is the best tool to produce a report which represents historical system information?A . Smart View TrackerB . Smart view MonitorC . Smart Reporter-Standard ReportsD . Smart Reporter-Express ReportsView AnswerAnswer: D

April 26, 2019No CommentsREAD MORE +