<< Prev Question Next Question >>

Question 55/158

The WebUI offers three methods for downloading Hotfixes via CPUSE. One of them is Automatic method. How many times per day will CPUSE agent check for hotfixes and automatically download them?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (158q)
Question 1: Which statement is NOT TRUE about Delta synchronization?...
Question 2: Which option would allow you to make a backup copy of the OS...
Question 3: Which software blade enables Access Control policies to acce...
Question 4: What is the SOLR database for?
Question 5: The Firewall kernel is replicated multiple times, therefore:...
Question 6: The technical-support department has a requirement to access...
1 commentQuestion 7: Which of the following is NOT an option to calculate the tra...
1 commentQuestion 8: Which of the following describes how Threat Extraction funct...
Question 9: Fill in the blank: A(n) _____ rule is created by an administ...
Question 10: Of all the Check Point components in your network, which one...
Question 11: Packet acceleration (SecureXL) identifies connections by sev...
Question 12: Which of the following methods can be used to update the tru...
Question 13: Which of the following is NOT a role of the SmartCenter:...
Question 14: True or False: In a Distributed Environment, a Central Licen...
Question 15: You find that Users are not prompted for authentication when...
Question 16: What type of NAT is a one-to-one relationship where each hos...
Question 17: Check Point ClusterXL Active/Active deployment is used when:...
Question 18: Which configuration element determines which traffic should ...
Question 19: As a Security Administrator, you must refresh the Client Aut...
Question 20: How do you configure an alert in SmartView Monitor?...
Question 21: To view statistics on detected threats, which Threat Tool wo...
Question 22: Which of these components does NOT require a Security Gatewa...
Question 23: Fill in the blank: An identity server uses a ___________ for...
Question 24: What is the difference between SSL VPN and IPSec VPN?...
Question 25: Which of these statements describes the Check Point ThreatCl...
Question 26: Which of the following is NOT a VPN routing option available...
Question 27: Which option will match a connection regardless of its assoc...
Question 28: What Check Point tool is used to automatically update Check ...
Question 29: What is the purpose of the CPCA process?...
Question 30: In SmartConsole, objects are used to represent physical and ...
Question 31: What is UserCheck?
Question 32: Which the following type of authentication on Mobile Access ...
Question 33: What data MUST be supplied to the SmartConsole System Restor...
Question 34: When using GAiA, it might be necessary to temporarily change...
Question 35: Which of the following is NOT an attribute of packet acceler...
Question 36: Which option, when applied to a rule, allows all encrypted a...
Question 37: When Identity Awareness is enabled, which identity source(s)...
Question 38: You have configured SNX on the Security Gateway. The client ...
Question 39: How many users can have read/write access in Gaia at one tim...
Question 40: Using ClusterXL, what statement is true about the Sticky Dec...
Question 41: Anti-Spoofing is typically set up on which object type?...
Question 42: Which limitation of CoreXL is overcome by using (mitigated b...
Question 43: Tom has connected to the R80 Management Server remotely usin...
Question 44: You manage a global network extending from your base in Chic...
Question 45: The SIC Status "Unknown" means
Question 46: Which of the following is a hash algorithm?...
Question 47: According to Check Point Best Practice, when adding a 3rd pa...
Question 48: What is the purpose of a Stealth Rule?...
Question 49: Fill in the blank: To create policy for traffic to or from a...
Question 50: Message digests use which of the following?...
Question 51: R80 Security Management Server can be installed on which of ...
Question 52: Which GUI tool can be used to view and apply Check Point lic...
Question 53: Which Check Point software blade prevents malicious files fr...
Question 54: NAT can NOT be configured on which of the following objects?...
Question 55: The WebUI offers three methods for downloading Hotfixes via ...
Question 56: Which of the following are available SmartConsole clients wh...
Question 57: What is the Manual Client Authentication TELNET port?...
Question 58: Fill in the blank: In order to install a license, it must fi...
Question 59: While in SmartView Tracker, Brady has noticed some very odd ...
Question 60: What protocol is specifically used for clustered environment...
Question 61: What licensing feature is used to verify licenses and activa...
Question 62: To fully enable Dynamic Dispatcher on a Security Gateway:...
Question 63: Please choose correct command syntax to add an "emailserver1...
Question 64: In Logging and Monitoring, the tracking options are Log, Det...
Question 65: When should you generate new licenses?...
Question 66: How can the changes made by an administrator before publishi...
Question 67: In order to modify Security Policies the administrator can u...
Question 68: MegaCorp's security infrastructure separates Security Gatewa...
Question 69: View the rule below. What does the pen-symbol in the left co...
Question 70: Choose what BEST describes the reason why querying logs now ...
Question 71: Which tool provides a list of trusted files to the administr...
Question 72: Which of the following statements accurately describes the c...
Question 73: In SmartView Tracker, which rule shows when a packet is drop...
Question 74: You are the Check Point administrator for Alpha Corp. You re...
Question 75: What is the purpose of the Stealth Rule?...
Question 76: Phase 1 of the two-phase negotiation process conducted by IK...
Question 77: Due to high CPU workload on the Security Gateway, the securi...
Question 78: Fill in the blanks: A security Policy is created in ________...
Question 79: What is the default shell of Gaia CLI?...
Question 80: You are the Security Administrator for MegaCorp. In order to...
Question 81: When a Security Gateway sends its logs to an IP address othe...
Question 82: What object type would you use to grant network access to an...
Question 83: After the initial installation on Check Point appliance, you...
Question 84: When an encrypted packet is decrypted, where does this happe...
Question 85: Which of the following commands is used to monitor cluster m...
Question 86: Which policy type is used to enforce bandwidth and traffic c...
Question 87: There are 4 ways to use the Management API for creating host...
Question 88: What port is used for communication to the User Center with ...
Question 89: Fill in the blank: The ________ feature allows administrator...
Question 90: How would you determine the software version from the CLI?...
Question 91: Which SmartConsole tab shows logs and detects security threa...
Question 92: Which of the following is NOT a set of Regulatory Requiremen...
Question 93: Which two Identity Awareness commands are used to support id...
Question 94: Vanessa is a Firewall administrator. She wants to test a bac...
Question 95: Identity Awareness allows the Security Administrator to conf...
Question 96: Which Check Point software blade provides visibility of user...
Question 97: In what way is Secure Network Distributor (SND) a relevant f...
Question 98: What is the purpose of a Clean-up Rule?...
Question 99: If the Active Security Management Server fails or if it beco...
Question 100: Where do we need to reset the SIC on a gateway object?...
Question 101: Which Threat Prevention Software Blade provides protection f...
Question 102: When defining group-based access in an LDAP environment with...
Question 103: Fill in the blank: ________information is included in the "F...
Question 104: Fill in the blank: An Endpoint identity agent uses a _______...
Question 105: When using Monitored circuit VRRP, what is a priority delta?...
Question 106: Which of the below is the MOST correct process to reset SIC ...
Question 107: Your company enforces a strict change control policy. Which ...
Question 108: What action can be performed from SmartUpdate R77?...
Question 109: Where is the "Hit Count" feature enabled or disabled in Smar...
Question 110: Which of the following is NOT a valid configuration screen o...
Question 111: The "Hit count" feature allows tracking the number of connec...
Question 112: Sally has a Hot Fix Accumulator (HFA) she wants to install o...
Question 113: The organization's security manager wishes to back up just t...
Question 114: Which feature in R77 permits blocking specific IP addresses ...
Question 115: When configuring Spoof Tracking, which tracking actions can ...
Question 116: Using R80 Smart Console, what does a "pencil icon" in a rule...
Question 117: What is the appropriate default Gaia Portal address?...
Question 118: Office mode means that:
Question 119: Phase 1 of the two-phase negotiation process conducted by IK...
Question 120: You have discovered suspicious activity in your network. Wha...
Question 121: Fill in the blank: In Security Gateways R75 and above, SIC u...
Question 122: What is the BEST command to view configuration details of al...
Question 123: After the initial installation the First Time Configuration ...
Question 124: Which component functions as the Internal Certificate Author...
Question 125: Which of the following is a new R80.10 Gateway feature that ...
Question 126: Choose what BEST describes users on Gaia Platform....
Question 127: Which of the following is NOT a component of Check Point Cap...
Question 128: You want to verify if there are unsaved changes in GAiA that...
Question 129: Which set of objects have an Authentication tab?...
Question 130: Which of the following is NOT a tracking log option in R80.x...
Question 131: Which of the following is NOT an element of VPN Simplified M...
Question 132: Which of the following licenses are considered temporary?...
Question 133: Which information is included in the "Extended Log" tracking...
Question 134: Which directory holds the SmartLog index files by default?...
Question 135: In which VPN community is a satellite VPN gateway not allowe...
Question 136: Which R77 GUI would you use to see number of packets accepte...
Question 137: Which NAT rules are prioritized first?...
Question 138: To quickly review when Threat Prevention signatures were las...
Question 139: Which Check Point software blade provides protection from ze...
Question 140: What is the purpose of Priority Delta in VRRP?...
Question 141: Which of the following is TRUE about the Check Point Host ob...
Question 142: Fill in the blanks: A High Availability deployment is referr...
Question 143: Administrator Dave logs into R80 Management Server to review...
Question 144: Which back up method uses the command line to create an imag...
Question 145: Which is NOT an encryption algorithm that can be used in an ...
Question 146: Which of these attributes would be critical for a site-to-si...
Question 147: Choose what BEST describes a Session....
Question 148: The Network Operations Center administrator needs access to ...
Question 149: What happens when you run the command: fw sam -J src [Source...
Question 150: Which of the completed statements is NOT true? The WebUI can...
Question 151: R80 is supported by which of the following operating systems...
Question 152: After trust has been established between the Check Point com...
Question 153: Fill in the blank: By default, the SIC certificates issued b...
Question 154: When launching SmartDashboard, what information is required ...
Question 155: Which of the following is NOT a method used by Identity Awar...
Question 156: What happens if the identity of a user is known?...
Question 157: Which message indicates IKE Phase 2 has completed successful...
Question 158: What two ordered layers make up the Access Control Policy La...