<< Prev Question Next Question >>

Question 12/59

What does the command "vpn shell tunnels delete all ike" do?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (59q)
Question 1: Where does the translation occur with Hide NAT?...
Question 2: The maximum number of critical devices or pnotes on a cluste...
Question 3: The Security Gateway is installed on GAiA R80. The default p...
2 commentQuestion 4: A Firewall administrator is attempting to push a policy to a...
Question 5: The pepd and pdpd daemons are used by which Software blade?...
1 commentQuestion 6: Which Check Point daemon, if it stops responding or goes dow...
1 commentQuestion 7: URL Filtering is an essential part of Web Security in the Ga...
Question 8: Which command should be used to insert fw monitor before sec...
Question 9: Which kernel table stores information about NAT connections?...
Question 10: Of how many packets consists Main Mode in Phase 1?...
Question 11: Which one of following commands should you run to display HT...
Question 12: What does the command "vpn shell tunnels delete all ike" do?...
Question 13: What is the name of the table that an administrator would re...
Question 14: While using IPS, the network performance is being impacted o...
Question 15: Which "fwm" command syntax will instruct the gateway to load...
Question 16: How can you print the session UUID and the UUID of a connect...
Question 17: When enabling hyper-threading on a Security Gateway, the adm...
Question 18: What occurs when Bypass Under Load activated?...
Question 19: Which command is used to enable IPv6 on Security Gateway?...
Question 20: How can you ensure that a particular service does not use th...
1 commentQuestion 21: Which of the connections cannot be accelerated with SecureXL...
1 commentQuestion 22: Having a look at the output of the "fwaccel conns" command, ...
Question 23: Fill in the blank. The tool ____________________ generates a...
Question 24: You run "cat/proc/smt_status" on your security gateway and t...
Question 25: Which is the correct "fw monitor" syntax for creating a capt...
Question 26: Which one of the following does not belong to an initial sta...
Question 27: What is the command to check the current status of hyper-thr...
Question 28: What is the default setting and minimum value of the Sync ti...
Question 29: Fill in the blank: The R80 feature _________________ permits...
Question 30: In R80 spoofing is defined as a method of:...
Question 31: What is enabled by the command "vpn debug mon"?...
Question 32: How many layers are incorporated in IPS detection and what a...
Question 33: What does CMI stand for in relation to the Access Control Po...
Question 34: Fill in the blank: The R80 utility fw monitoris used to trou...
Question 35: Which of the following is correct in a Threat Prevention pol...
Question 36: Which Check Point utility should be used to assist in analyz...
Question 37: Which type of SecureXL templates is enabled by default on Se...
Question 38: What is the difference between disabling SecureXL by running...
Question 39: Where will the command, "fw monitor -pi -vpn", be inserted i...
Question 40: Which of the following statements is TRUE about R80 manageme...
Question 41: You issued the command "set ipv6-state on" in order to enabl...
Question 42: If cluster members are geographically separated and the time...
Question 43: After determining that the IPS Blade is causing high resourc...
Question 44: What process(es) should be checked if there is high I/O and ...
Question 45: Which kernel debug flag should you use to troubleshoot NAT c...
Question 46: You are working with multiple Security Gateways enforcing an...
Question 47: Your customer is experiencing problems connecting to the Sec...
Question 48: What is the difference between Client-Side and Server-Side N...
1 commentQuestion 49: For organizations with existing IPv4 networks who wish to mo...
Question 50: Which of the following inputs is suitable for debugging HTTP...
1 commentQuestion 51: Joey's implementing a new R80.10 firewall cluster into the n...
Question 52: Which daemon would you debug if you have issues acquiring id...
Question 53: What effect would change the parameter of fwha_timer_cpha_re...
Question 54: What is the correct command to turn off an IKE debug?...
Question 55: If certain services should not use the Cluster Object IP Add...
1 commentQuestion 56: Which file would you need to make sure you collect when debu...
Question 57: Which of the following ports are used for SIC?...
Question 58: Which templates for SecureXL are not enabled by default?...
Question 59: Which of the following is NOT a special consideration while ...