What are some measures you can take to prevent IPS false positives?

What are some measures you can take to prevent IPS false positives?A . Exclude problematic services from being protected by IPS (sip, H 323, etc )B . Use IPS only in Detect modeC . Use Recommended IPS profileD . Capture packets. Update the IPS database, and Back up custom IPS...

August 29, 2021 No Comments READ MORE +

What is the function of the Core Dump Manager utility?

What is the function of the Core Dump Manager utility?A . To generate a new core dump for analysisB . To limit the number of core dump files per process as well as the total amount of disk space used by core filesC . To determine which process is slowing...

August 29, 2021 No Comments READ MORE +

What command sets a specific interface as not accelerated?

What command sets a specific interface as not accelerated?A . noaccel-s<interface1>B . fwaccel exempt state <interface1>C . nonaccel -s <interface1>D . fwaccel -n <intetface1 >View AnswerAnswer: C

August 29, 2021 1 Comment READ MORE +

Which of the following is stored in the Log Domain?

The management configuration stored in the Postgres database is partitioned into several relational database Domains, like - System, User, Global and Log Domains. The User Domain stores the network objects and security policies. Which of the following is stored in the Log Domain?A . Configuration data of Log Servers and...

August 28, 2021 1 Comment READ MORE +

What is the buffer size set by the fw ctl zdebug command?

What is the buffer size set by the fw ctl zdebug command?A . 1 MBB . 1 GBC . 8MBD . 8GBView AnswerAnswer: A

August 27, 2021 No Comments READ MORE +

What is a possible reason for this?

You are upgrading your NOC Firewall (on a Check Point Appliance) from R77 to R80 30 but you did not touch thesecuritypolicy After the upgrade you can't connect to the new R80 30 SmartConsole of the upgraded Firewall anymore What is a possible reason for this?A . new new console...

August 26, 2021 No Comments READ MORE +

What table does the command "fwaccel conns" pull information from?

What table does the command "fwaccel conns" pull information from?A . fwxl_connsB . SecureXLConC . cphwd_dbD . sxl_connectionsView AnswerAnswer: A

August 25, 2021 No Comments READ MORE +

Which process is responsible for the generation of certificates?

Which process is responsible for the generation of certificates?A . cpmB . cpcaC . dbsyncD . fwmView AnswerAnswer: B

August 24, 2021 No Comments READ MORE +

the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?A . there is no differenceB . the C2S VPN uses a different VPN deamon and there a second VPN debugC . the C2S VPN can not be debugged as it uses different protocols for the key...

August 24, 2021 No Comments READ MORE +

Which Threat Prevention daemon is the core Threat Emulator, engine and responsible for emulation files and communications with Threat Cloud?

Which Threat Prevention daemon is the core Threat Emulator, engine and responsible for emulation files and communications with Threat Cloud?A . ctasdB . inmsdC . tedD . scrubView AnswerAnswer: C Explanation: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

August 24, 2021 No Comments READ MORE +