With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.

With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.A . NT domainB . SMTPC . LDAPD . SecurIDView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197

July 8, 2020 No Comments READ MORE +

The security Gateway is installed on GAiA R80. The default port for the WEB User Interface is _______ .

The security Gateway is installed on GAiA R80. The default port for the WEB User Interface is _______ .A . TCP 18211B . TCP 257C . TCP 4433D . TCP 443View AnswerAnswer: D

July 8, 2020 No Comments READ MORE +

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?A . CentralB . CorporateC . FormalD . LocalView AnswerAnswer: D

July 8, 2020 No Comments READ MORE +

Which Check Point feature enables application scanning and the detection?

Which Check Point feature enables application scanning and the detection?A . Application DictionaryB . AppWikiC . Application LibraryD . CPAppView AnswerAnswer: B Explanation: AppWiki Application Classification Library AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking,...

July 8, 2020 No Comments READ MORE +

Which of the following is NOT an integral part of VPN communication within a network?

Which of the following is NOT an integral part of VPN communication within a network?A . VPN keyB . VPN communityC . VPN trust entitiesD . VPN domainView AnswerAnswer: A Explanation: - VPN key (to not be confused with pre-shared key that is used for authentication). - VPN trust entities,...

July 8, 2020 No Comments READ MORE +

Which one of the following is the preferred licensing model?

Which one of the following is the preferred licensing model?A . Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.B . Central licensing because it ties the package license to the IP-address of the Security Management...

July 8, 2020 No Comments READ MORE +

Packages and licenses are loaded from all of these sources EXCEPT

Packages and licenses are loaded from all of these sources EXCEPTA . Download Center Web siteB . UserUpdateC . User CenterD . Check Point DVDView AnswerAnswer: B Explanation: Packages and licenses are loaded into these repositories from several sources: - the Download Center web site (packages) - the Check Point...

July 8, 2020 No Comments READ MORE +

Why does it not allow him to specify the pre-shared secret?

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret, the administrator found that the check box to enable...

July 7, 2020 No Comments READ MORE +

What are the three authentication methods for SIC?

What are the three authentication methods for SIC?A . Passwords, Users, and standards-based SSL for the creation of secure channelsB . Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryptionC . Packet Filtering, certificates, and 3DES or AES128 for encryptionD . Certificates, Passwords, and...

July 7, 2020 No Comments READ MORE +

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . EditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: To create a new permission profile:

July 7, 2020 No Comments READ MORE +