If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca if B. cphaconf ccp multicast C. cphaconf debug data D. cphaprob igmpView AnswerAnswer: D
Which packet info is ignored with Session Rate Acceleration?A . source port ranges B. source ip C. source port D. same info from Packet Acceleration is usedView AnswerAnswer: B
Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...
How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=220.127.116.11;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=18.104.22.168;”View AnswerAnswer: D
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureID B. SecurID C. Complexity D. TacAcsView AnswerAnswer: B
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....