To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
SmartEvent uses it's event policy to identify events. How can this be customized?
Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
Which file gives you a list of all security servers in use, including port number?
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.
What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
Can multiple administrators connect to a Security Management Server at the same time?
What are types of Check Point APIs available currently as part of R81.10 code?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Fill in the blanks. There are ________ types of software containers: ___________.
Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?
Fill in the blank: An identity server uses a __________ for user authentication.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?
NO: 155
You need to see which hotfixes are installed on your gateway, which command would you use?
To add a file to the Threat Prevention Whitelist, what two items are needed?
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
Using ClusterXL, what statement is true about the Sticky Decision Function?
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
What are the different command sources that allow you to communicate with the API server?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.
John is using Management HA. Which Smartcenter should be connected to for making changes?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
R81.10 management server can manage gateways with which versions installed?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
What level of CPU load on a Secure Network Distributor would indicate that another may be necessary?
Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?
You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?
In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:
If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?