Q: 11
When doing a Stand-Alone Installation, you would install the Security Management Server with
which other Check Point architecture component?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
What does it mean if Deyra sees the gateway status:
Choose the BEST
Choose the BESTYour Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that
the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good
level? Select the BEST
How could you tune the profile in order to lower the CPU load still maintaining security at good
level? Select the BESTYour Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members?
Choose the best
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock
icon on a rule? Choose the BEST
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
AdminA and AdminB are both logged into SmartConsole. What does it mean if AdminB sees a lock
icon on a rule? Choose the BEST
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
How is communication between different Check Point components secured in R80? As with all
questions, select the best
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which Threat Prevention Software Blade provides protection from malicious software that can infect
your network computers? (Choose the best
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2