Which statement is true regarding redundancy?

Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...

July 22, 2022 No Comments READ MORE +

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:A . fw ctl multik set_mode 1B . fw ctl Dynamic_Priority_Queue onC . fw ctl Dynamic_Priority_Queue enableD . fw ctl multik set_mode 9View AnswerAnswer: D

July 21, 2022 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTableB . fw tab Ct connectionsC . fw tab Ct connectionD . fw tab connectionsView AnswerAnswer: B

July 21, 2022 No Comments READ MORE +

How can you enable them?

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...

July 21, 2022 No Comments READ MORE +

Which application would you use?

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client InfoB . SecuRemoteC . Check Point ProtectD . Check Point Capsule CloudView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

In R81, how do you manage your Mobile Access Policy?

In R81, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A

July 21, 2022 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B

July 21, 2022 No Comments READ MORE +

Which is NOT an option to adjust or configure?

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?A . SeverityB . Automatic reactionsC . PolicyD . ThresholdView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote UserB . Check Point Capsule WorkspaceC . Check Point Mobile Web PortalD . Check Point Capsule RemoteView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

What is the difference between an event and a log?

What is the difference between an event and a log?A . Events are generated at gateway according to Event PolicyB . A log entry becomes an event when it matches any rule defined in Event PolicyC . Events are collected with SmartWorkflow form Trouble Ticket systemsD . Log and Events...

July 21, 2022 No Comments READ MORE +