Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is NOT used for identifying connection?

Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is NOT used for identifying connection?A . Source AddressB . Destination AddressC . TCP Acknowledgment NumberD . Source PortView AnswerAnswer: C Explanation: https //sc1.checkpoint.com/documents/R77/CP R77_Firewall_WebAdmm/92711.htm

September 19, 2021 No Comments READ MORE +

SandBlast agent extends 0 day prevention to what part of the network?

SandBlast agent extends 0 day prevention to what part of the network?A . Web Browsers and user devicesB . DMZ serverC . CloudD . Email serversView AnswerAnswer: A

September 19, 2021 No Comments READ MORE +

In what way are SSL VPN and IPSec VPN different?

In what way are SSL VPN and IPSec VPN different?A . SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientlessB . SSL VPN adds an extra VPN header to the packet, IPSec VPN does notC . IPSec VPN does not support two factor authentication, SSL...

September 18, 2021 No Comments READ MORE +

What solution is Multi-queue intended to provide?

What solution is Multi-queue intended to provide?A . Improve the efficiency of traffic handling by SecureXL SNDsB . Reduce the confusion for traffic capturing in FW MonitorC . Improve the efficiency of CoreXL Kernel InstancesD . Reduce the performance of network interfacesView AnswerAnswer: C

September 18, 2021 No Comments READ MORE +

Which software blade does NOT accompany the Threat Prevention policy?

Which software blade does NOT accompany the Threat Prevention policy?A . Anti-virusB . IPSC . Threat EmulationD . Application Control and URL FilteringView AnswerAnswer: D

September 18, 2021 No Comments READ MORE +

Post-Automatic/Manual NAT rules

Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A

September 18, 2021 No Comments READ MORE +

What is not a purpose of the deployment of Check Point API?

What is not a purpose of the deployment of Check Point API?A . Execute an automated script to perform common tasksB . Create a customized GUI Client for manipulating the objects databaseC . Create products that use and enhance the Check Point solutionD . Integrate Check Point products with 3rd...

September 18, 2021 No Comments READ MORE +

Which statement is correct about the Sticky Decision Function?

Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator cardB . Does not support SPI’s when configured for Load SharingC . It is automatically disabled if the Mobile Access Software Blade is enabled on the...

September 18, 2021 No Comments READ MORE +

Session unique identifiers are passed to the web api using which http header option?

Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sidB . Accept-CharsetC . Proxy-AuthorizationD . ApplicationView AnswerAnswer: C

September 17, 2021 No Comments READ MORE +

Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.

Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.A . Accept; redirectB . Accept; dropC . Redirect; dropD . Drop; acceptView AnswerAnswer: D

September 17, 2021 No Comments READ MORE +