Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?

Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?A . host name myHost12 ip-address 10.50.23.90B . mgmt: add host name ip-address 10.50.23.90C . add host name emailserver1 ip-address 10.50.23.90D . mgmt: add host name emailserver1 ip-address 10.50.23.90View AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

Which is the correct order of a log flow processed by SmartEvent components?

Which is the correct order of a log flow processed by SmartEvent components?A . Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent ClientB . Firewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent ClientC . Firewall > Log Server > SmartEvent...

September 20, 2021 No Comments READ MORE +

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A

September 19, 2021 No Comments READ MORE +

SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:

SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of...

September 19, 2021 No Comments READ MORE +

You have existing dbedit scripts from R77. Can you use them with R80.10?

You have existing dbedit scripts from R77. Can you use them with R80.10?A . dbedit is not supported in R80.10B . dbedit is fully supported in R80.10C . You can use dbedit to modify threat prevention or access policies, but not create or modify layersD . dbedit scripts are being...

September 19, 2021 No Comments READ MORE +

What is the SandBlast Agent designed to do?

What is the SandBlast Agent designed to do?A . Performs OS-level sandboxing for SandBlast Cloud architectureB . Ensure the Check Point SandBlast services is running on the end user’s systemC . If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the networkD ....

September 19, 2021 No Comments READ MORE +

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC)B . Restart Daemons if they failC . Transfers messages between Firewall processesD . Pulls application monitoring statusView AnswerAnswer: D

September 19, 2021 No Comments READ MORE +

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.A . ffffB . 1C . 3D . 2View AnswerAnswer: D

September 19, 2021 No Comments READ MORE +

How many interfaces can you configure to use the Multi-Queue feature?

How many interfaces can you configure to use the Multi-Queue feature?A . 10 interfacesB . 3 interfacesC . 4 interfacesD . 5 interfacesView AnswerAnswer: D

September 19, 2021 No Comments READ MORE +

What is one of the requirements for a successful upgrade?

Matt wants to upgrade his old Security Management server to R80.x using the Advanced Upgrade with Database Migration . What is one of the requirements for a successful upgrade?A . Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log...

September 19, 2021 No Comments READ MORE +