Which of the listed load-balancing methods is NOT valid?
Which of the listed load-balancing methods is NOT valid?A . RandomB . DomainC . They are all validD . Round TripView AnswerAnswer: C
Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
You intend to upgrade a Check Point Gateway from R65 to R76. To avoid problems, you decide to back up the Gateway. Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?A . snapshotB . database revisionC . backupD...
When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?
When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?A . Only Group in BranchB . Only Sub TreeC . OU Auth and select Group NameD . All Account-Unit's UsersView AnswerAnswer: A
The Smart Event Correlation Unit:
The Smart Event Correlation Unit:A . adds events to the events database.B . assigns a severity level to an event.C . analyzes each IPS log entry as it enters the Log server.D . displays the received events.View AnswerAnswer: C
When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which valid Load Sharing method will consider VPN information?
When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which valid Load Sharing method will consider VPN information?A . Load Sharing based on IP addresses, ports, and serial peripheral interfacesB . Load Sharing based on SPIsC . Load Sharing based on ports, VTI, and IP addressesD...
Which of the following statements is TRUE?
Jacob is using a mesh VPN Community to create a sitE. to-site VPN. The VPN properties in this mesh Community display in this graphic: Which of the following statements is TRUE?A . If Jacob changes the setting, "Perform key exchange encryption with" from "3DES" to "DES", he will enhance the...
Provisioning Profiles can NOT be applied to:
Provisioning Profiles can NOT be applied to:A . UTM-1 EDGE AppliancesB . UTM-1 AppliancesC . IP AppliancesD . Power-1 AppliancesView AnswerAnswer: C
The ________ Check Point Cluster XL mode must synchronize the physical interface IP and MAC addresses on all clustered interfaces.
The ________ Check Point Cluster XL mode must synchronize the physical interface IP and MAC addresses on all clustered interfaces.A . New Mode HAB . Pivot Mode Load SharingC . Multicast Mode Load SharingD . Legacy Mode HAView AnswerAnswer: D
How do you verify the Check Point kernel running on a firewall?
How do you verify the Check Point kernel running on a firewall?A . fw ctl get kernelB . fw ctl pstatC . fw kernelD . fw ver -kView AnswerAnswer: D
When synchronizing clusters, which of the following statements is NOT true?
When synchronizing clusters, which of the following statements is NOT true?A . User Authentication connections will be lost by the cluster.B . An SMTP resource connection using CVP will be maintained by the cluster.C . In the case of a failover, accounting information on the failed member may be lost...