What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backup B. import backup C. cp_merge D. migrate importView AnswerAnswer: D

August 11, 2023 No Comments READ MORE +

R81.10 management server can manage gateways with which versions installed?

R81.10 management server can manage gateways with which versions installed?A . Versions R77 and higher B. Versions R76 and higher C. Versions R75.20 and higher D. Versions R75 and higherView AnswerAnswer: C

August 11, 2023 No Comments READ MORE +

Which packet info is ignored with Session Rate Acceleration?

Which packet info is ignored with Session Rate Acceleration?A . source port ranges B. source ip C. source port D. same info from Packet Acceleration is usedView AnswerAnswer: C Explanation: Identifies connections by five attributes - source address - destination address - source port - destination port - protocol

August 11, 2023 No Comments READ MORE +

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

August 11, 2023 No Comments READ MORE +

Which of the following process pulls application monitoring status?

Which of the following process pulls application monitoring status?A . fwd B. fwm C. cpwd D. cpdView AnswerAnswer: D

August 11, 2023 No Comments READ MORE +

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...

August 10, 2023 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A

August 10, 2023 No Comments READ MORE +

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . Synchronized B. Never been synchronized C. Lagging D. CollisionView AnswerAnswer: D

August 10, 2023 No Comments READ MORE +

Fill in the blank: The command ___________________ provides the most complete restoration of a

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_import B. cpconfig C. fwm dbimport -p <export file> D. cpinfo CrecoverView AnswerAnswer: A

August 10, 2023 No Comments READ MORE +

Which of those hosts should you try to remediate first?

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....

August 10, 2023 No Comments READ MORE +