How would you determine the software version from the CLI?

How would you determine the software version from the CLI?A . fw ver B. fw stat C. fw monitor D. cpinfoView AnswerAnswer: A

April 25, 2023 No Comments READ MORE +

Log query results can be exported to what file format?

Log query results can be exported to what file format?A . Word Document (docx) B. Comma Separated Value (csv) C. Portable Document Format (pdf) D. Text (txt)View AnswerAnswer: B

April 25, 2023 No Comments READ MORE +

Which of the following is an authentication method used for Identity Awareness?

Which of the following is an authentication method used for Identity Awareness?A . SSL B. Captive Portal C. PKI D. RSAView AnswerAnswer: B

April 25, 2023 No Comments READ MORE +

What Check Point technologies deny or permit network traffic?

What Check Point technologies deny or permit network traffic?A . Application Control, DLP B. Packet Filtering, Stateful Inspection, Application Layer Firewall. C. ACL, SandBlast, MPT D. IPS, Mobile Threat ProtectionView AnswerAnswer: B

April 25, 2023 No Comments READ MORE +

Which of the following are types of VPN communities?

Which of the following are types of VPN communities?A . Pentagon, star, and combination B. Star, octagon, and combination C. Combined and star D. Meshed, star, and combinationView AnswerAnswer: D

April 25, 2023 No Comments READ MORE +

Which of the following is considered to be the more secure and preferred VPN authentication method?

Which of the following is considered to be the more secure and preferred VPN authentication method?A . Password B. Certificate C. MD5 D. Pre-shared secretView AnswerAnswer: B

April 25, 2023 No Comments READ MORE +

Name the authentication method that requires token authenticator.

Name the authentication method that requires token authenticator.A . SecureID B. Radius C. DynamicID D. TACACSView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManag ement_AdminGuide/Topics-SECMG/Configuring-SecurID-Authentication.htm

April 25, 2023 No Comments READ MORE +

Fill in the blank Once a license is activated, a___________should be installed.

Fill in the blank Once a license is activated, a___________should be installed.A . Security Gateway Contract file B. Service Contract file C. License Management file D. License Contract fileView AnswerAnswer: B

April 25, 2023 No Comments READ MORE +

Is it possible to have more than one administrator connected to a Security Management Server at once?

Is it possible to have more than one administrator connected to a Security Management Server at once?A . Yes, but only if all connected administrators connect with read-only permissions. B. Yes, but objects edited by one administrator will be locked for editing by others until the session is published. C....

April 25, 2023 No Comments READ MORE +

Which tool is used to enable ClusterXL?

Which tool is used to enable ClusterXL?A . SmartUpdate B. cpconfig C. SmartConsole D. sysconfigView AnswerAnswer: B

April 24, 2023 No Comments READ MORE +