When enabling hyper-threading on a Security Gateway, the administrator needs to make sure there is enough _______________ to support additional CoreXL Firewall instances.

When enabling hyper-threading on a Security Gateway, the administrator needs to make sure there is enough _______________ to support additional CoreXL Firewall instances.A . drive spaceB . cpu’sC . available cacheD . available memoryView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk93000

September 30, 2018 No Comments READ MORE +

Of how many packets consists Main Mode in Phase 1?

Of how many packets consists Main Mode in Phase 1?A . Three packetsB . Four packetsC . Six packetsD . it depends on the encryption algorithm used. 3DES has three times more packets than DES encryptionView AnswerAnswer: C

September 21, 2018 No Comments READ MORE +

What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?

What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?A . avspB . dlpu and rad processesC . cptaD . cpm and fwmView AnswerAnswer: B

September 16, 2018 No Comments READ MORE +

Which of the following ports are used for SIC?

Which of the following ports are used for SIC?A . 18355 and 18356B . 18210 and 18211C . 257 and 258D . 18192 and 18193View AnswerAnswer: B Explanation: Reference: http://digitalcrunch.com/check-point-firewall/list-of-check-point-ports/

September 11, 2018 No Comments READ MORE +

How many layers are incorporated in IPS detection and what are they called?

How many layers are incorporated in IPS detection and what are they called?A . 4 layers C Passive Streaming Library (PSL), Protocol Parsers, Context Management, ProtectionsB . 3 layers C Active Streaming Library (ASL), CMI, ProtectionsC . 4 layers C Active Streaming Library (ASL), Protocol Parsers, Context Management, ProtectionsD ....

September 2, 2018 No Comments READ MORE +

What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?

What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?A . dyn_nat_tableB . connectionC . nat_dyn_tableD . fwx_allocView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk32224

August 31, 2018 No Comments READ MORE +

In order to test ClusterXL failovers which command would you use on one of the ClusterXL nodes to initiate a failover?

In order to test ClusterXL failovers which command would you use on one of the ClusterXL nodes to initiate a failover?A . clusterXL_admin down -pB . cluster XL_admin up -pC . cphaprob -d TEST -s ok registerD . cphaprob -d TEST -s problem unregisterView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/ CP_R76_ClusterXL_AdminGuide/7298.htm#o97358

August 30, 2018 No Comments READ MORE +

Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet ______________.

Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet ______________.A . getting the routing information according to the Forwarding Information Base (FIB)B . being processed by the firewall kernel moduleC . going through the slow pathD . being forced...

August 30, 2018 No Comments READ MORE +

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Which of the following inputs is suitable for debugging HTTPS inspection issues?A . vpn debug cptls onB . fw ctl debug Cm fw + conn drop cptlsC . fw diag debug tls enableD . fw debug tls on TDERROR_ALL_ALL=5View AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk108202

August 27, 2018 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address TranslationB . Hiding your firewall from unauthorized usersC . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come an authorized...

August 24, 2018 No Comments READ MORE +