To enforce the Security Policy correctly, a Security Gateway requires:

To enforce the Security Policy correctly, a Security Gateway requires:A . a routing table B. awareness of the network topology C. a Demilitarized Zone D. a Security Policy installView AnswerAnswer: B Explanation: The network topology represents the internal network (both the LAN and the DMZ) protected by the gateway. The...

November 17, 2022 No Comments READ MORE +

Under which file is the proxy arp configuration stored?

Under which file is the proxy arp configuration stored?A . $FWDIR/state/proxy_arp.conf on the management server B. $FWDIR/conf/local.arp on the management server C. $FWDIR/state/_tmp/proxy.arp on the security gateway D. $FWDIR/conf/local.arp on the gatewayView AnswerAnswer: D

November 17, 2022 No Comments READ MORE +

Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?A . AES-GCM-256 B. AES-CBC-256 C. AES-GCM-128View AnswerAnswer: B

November 16, 2022 No Comments READ MORE +

Which message indicates IKE Phase 2 has completed successfully?

Which message indicates IKE Phase 2 has completed successfully?A . Quick Mode Complete B. Aggressive Mode Complete C. Main Mode Complete D. IKE Mode CompleteView AnswerAnswer: A

November 16, 2022 No Comments READ MORE +

What is the purpose of the Stealth Rule?

What is the purpose of the Stealth Rule?A . To prevent users from directly connecting to a Security Gateway. B. To reduce the number of rules in the database. C. To reduce the amount of logs for performance issues. D. To hide the gateway from the Internet.View AnswerAnswer: A

November 16, 2022 No Comments READ MORE +

What are the Threat Prevention software components available on the Check Point Security Gateway?

What are the Threat Prevention software components available on the Check Point Security Gateway?A . IPS, Threat Emulation and Threat Extraction B. IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction D. IDS, Forensics, Anti-Virus, SandboxingView AnswerAnswer: C

November 16, 2022 No Comments READ MORE +

What does the Status Attention mean?

The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?A . Cannot reach the Security Gateway. B. The gateway and all its Software Blades are working properly. C. At least one Software Blade has a minor issue, but...

November 15, 2022 No Comments READ MORE +

Name the authentication method that requires token authenticator.

Name the authentication method that requires token authenticator.A . SecureID B. Radius C. DynamicID D. TACACSView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Configuring-SecurID-Authentication.htm

November 15, 2022 No Comments READ MORE +

From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?

From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?A . Verify a Security Policy B. Open a terminal shell C. Add a static route D. View Security Management GUI ClientsView AnswerAnswer: B

November 15, 2022 No Comments READ MORE +

How are the backups stored in Check Point appliances?

How are the backups stored in Check Point appliances?A . Saved as*.tar under /var/log/CPbackup/backups B. Saved as*tgz under /var/CPbackup C. Saved as*tar under /var/CPbackup D. Saved as*tgz under /var/log/CPbackup/backupsView AnswerAnswer: B Explanation: Backup configurations are stored in: /var/CPbackup/backups/

November 15, 2022 No Comments READ MORE +