What does this mean?

You are the administrator for ABC Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it. What does this mean?A . The rule No.6 has been marked for deletion in...

January 26, 2018 No Comments READ MORE +

With which command can you view the running configuration of Gaia-based system.

With which command can you view the running configuration of Gaia-based system.A . show conf-activeB . show configuration activeC . show configurationD . show running-configurationView AnswerAnswer: C

January 26, 2018 No Comments READ MORE +

Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:

Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:A . When Joe logs in, Bob will be log out automatically.B...

January 25, 2018 No Comments READ MORE +

Which of the following is TRUE regarding Gaia command line?

Which of the following is TRUE regarding Gaia command line?A . Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is used only for OS level tasks.B . Configuration changes should be done in expert-mode and CLISH is used for monitoring.C . Configuration changes should...

January 22, 2018 No Comments READ MORE +

Which of the following is NOT a back up method?

Which of the following is NOT a back up method?A . Save backupB . System backupC . snapshotD . MigrateView AnswerAnswer: A Explanation: The built-in Gaia backup procedures: Snapshot Management System Backup (and System Restore) Save/Show Configuration (and Load Configuration) Check Point provides three different...

January 20, 2018 No Comments READ MORE +

Fill in the blank: A _________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.

Fill in the blank: A _________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.A . Clientless remote accessB . Clientless direct accessC . Client-based remote accessD . Direct accessView AnswerAnswer: A Explanation: Clientless - Users connect...

January 18, 2018 No Comments READ MORE +

Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.

Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.A . Cleanup; stealthB . Stealth; implicitC . Cleanup; defaultD . Implicit; explicitView AnswerAnswer: A

January 17, 2018 No Comments READ MORE +

Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?A . Anti-VirusB . IPSC . Anti-SpamD . Anti-botView AnswerAnswer: B Explanation: The IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network...

January 14, 2018 No Comments READ MORE +

Where can the administrator check for more information on these errors?

Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below. Where can the administrator check for more information on these errors? A . The Log and Monitor section in...

January 10, 2018 No Comments READ MORE +

Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?A . SmartView MonitorB . SmartEventC . SmartUpdateD . SmartDashboardView AnswerAnswer: B Explanation: SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter....

January 9, 2018 No Comments READ MORE +