Which tool is used to enable cluster membership on a Gateway?

Which tool is used to enable cluster membership on a Gateway?A . SmartUpdateB . cpconfigC . SmartConsoleD . sysconfigView AnswerAnswer: B

January 20, 2024 No Comments READ MORE +

Which of the following is NOT a component of a Distinguished Name?

Which of the following is NOT a component of a Distinguished Name?A . Common NameB . CountryC . User containerD . Organizational UnitView AnswerAnswer: C

January 20, 2024 No Comments READ MORE +

In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.

In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.A . Upgrade the software versionB . Open WebUIC . Open SSHD . Open service request with Check Point Technical SupportView AnswerAnswer: A

January 20, 2024 No Comments READ MORE +

Which of the following options can you add to each Log, Detailed Log and Extended Log?

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?A . AccountingB . SuppressionC . Accounting/SuppressionD . Accounting/ExtendedView AnswerAnswer: C

January 20, 2024 No Comments READ MORE +

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:A . Rename the hostname of the...

January 20, 2024 No Comments READ MORE +

Using ClusterXL, what statement is true about the Sticky Decision Function?

Using ClusterXL, what statement is true about the Sticky Decision Function?A . Can only be changed for Load Sharing implementationsB . All connections are processed and synchronized by the pivotC . Is configured using cpconfigD . Is only relevant when using SecureXLView AnswerAnswer: A

January 19, 2024 No Comments READ MORE +

Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?A . AD QueryB . Browser-Based AuthenticationC . Identity AgentsD...

January 19, 2024 No Comments READ MORE +

When an encrypted packet is decrypted, where does this happen?

When an encrypted packet is decrypted, where does this happen?A . Security policyB . Inbound chainC . Outbound chainD . Decryption is not supportedView AnswerAnswer: B

January 19, 2024 No Comments READ MORE +

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?A . FullB . CustomC . CompleteD . LightView AnswerAnswer: A

January 19, 2024 No Comments READ MORE +

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?A . SND is a feature to accelerate multiple SSL VPN connectionsB . SND is an alternative to IPSec Main Mode, using only 3 packetsC . SND is used to distribute packets among Firewall instancesD ....

January 19, 2024 No Comments READ MORE +