Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table?A . fw tab Ct StateTable B. fw tab Ct connections C. fw tab Ct connection D. fw tab connectionsView AnswerAnswer: B

January 29, 2023 No Comments READ MORE +

Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...

January 29, 2023 No Comments READ MORE +

How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A

January 29, 2023 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D

January 29, 2023 No Comments READ MORE +

What is the correct command to observe the Sync traffic in a VRRP environment?

What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D

January 28, 2023 No Comments READ MORE +

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureID B. SecurID C. Complexity D. TacAcsView AnswerAnswer: B

January 28, 2023 No Comments READ MORE +

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...

January 28, 2023 No Comments READ MORE +

Which of those hosts should you try to remediate first?

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....

January 28, 2023 No Comments READ MORE +

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .A . TCP Port 18190 B. TCP Port 18209 C. TCP Port 19009 D. TCP Port 18191View AnswerAnswer: D

January 28, 2023 No Comments READ MORE +

To fully enable Dynamic Dispatcher on a Security Gateway:

To fully enable Dynamic Dispatcher on a Security Gateway:A . run fw ctl multik set_mode 9 in Expert mode and then Reboot. B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu. C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save,...

January 28, 2023 No Comments READ MORE +