Valid 156-315.77 Dumps shared by ExamDiscuss.com for Helping Passing 156-315.77 Exam! ExamDiscuss.com now offer the newest 156-315.77 exam dumps, the ExamDiscuss.com 156-315.77 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 156-315.77 dumps with Test Engine here:

Access 156-315.77 Dumps Premium Version
(755 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 179/467

Laura notices the Microsoft Visual Basic Bits Protection is set to inactive. She wants to set the Microsoft Visual Basic Kill Bits Protection and all other Low Performance Impact Protections to Prevent. She asks her manager for approval and stated she can turn theses on.
But he wants Laura to make sure no high Performance Impacted Protections are turned on while changing this setting.

Using the out below, how would Laura change the Default_Protection on Performance Impact Protections classified as low from inactive to prevent until meeting her other criteria?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (467q)
Question 1: What firewall kernel table stores information about port all...
Question 2: If you need strong protection for the encryption of user dat...
Question 3: You are preparing computers for a new ClusterXL deployment. ...
Question 4: A Security Administrator opens a new session, makes changes ...
Question 5: Which file defines the fields for each object used in the fi...
Question 6: If you are experiencing LDAP issues, which of the following ...
Question 7: MultiCorp has bought company OmniCorp and now has two active...
Question 8: UserA is able to create a SmartLSM Security Cluster Profile ...
Question 9: What command will stop all (and only) Management Portal serv...
Question 10: Which of the following is a supported Sticky Decision Functi...
Question 11: Which command would you use to save the IP address and routi...
Question 12: Use the table to match the BEST Management High Availability...
Question 13: Fill in the blank. To save your OSPF configuration in GAiA, ...
Question 14: Your organization has many VPN-1 Edge gateways at various br...
Question 15: The following configuration is for VPN-1 NGX:1s this configu...
Question 16: What is a Sticky Connection?
Question 17: Your customer wishes to install SmartWorkflow on top of R70 ...
Question 18: The following graphic illustrates which command being issued...
Question 19: Which OPSEC server is used to prevent users from accessing c...
Question 20: What type of object may be explicitly defined as a MEP VPN?...
Question 21: Check Point Clustering protocol, works on:...
Question 22: Assuming all connections that are allocated bandwidth in you...
Question 23: The process _____ is responsible for GUIClient communication...
Question 24: What is a requirement for setting up Management High Availab...
Question 25: In cryptography, the Rivest, Shamir, Adelman (RSA) scheme ha...
Question 26: Your company has two headquarters, one in London, one in New...
Question 27: John is the MultiCorp Security Administrator. If he suggests...
Question 28: _____ is NOT a ClusterXL mode.
Question 29: Identity Agent is a lightweight endpoint agent that authenti...
Question 30: When you add a resource service to a rule, which ONE of the ...
Question 31: A connection is said to be Sticky when:...
Question 32: The process that performs the authentication for legacy sess...
Question 33: Which Check Point QoS feature marks the ToS byte in the IP h...
Question 34: The following diagram illustrates how a VPN-1 SecureClient u...
Question 35: Fill in the blank. Type the command and syntax to configure ...
Question 36: Which of the following QoS rule action properties is an Adva...
Question 37: Which of the following is a valid Active Directory designati...
Question 38: An administrator has installed the latest HFA on the system ...
Question 39: What is the lowest possible version a Security Gateway may b...
Question 40: DShield is a Check Point feature used to block which of the ...
Question 41: VPN access control would fall under which VPN component?...
Question 42: To back up all events stored in the SmartEvent Server, you s...
Question 43: Where is the encryption domain for a SmartLSM Security Gatew...
Question 44: Which three of the following components are required to get ...
Question 45: When configuring a Web Application for SSL VPN remote access...
Question 46: Which of the following are valid PKI architectures?...
Question 47: Where multiple SmartDirectory servers exist in an organizati...
Question 48: How can you completely tear down a specific VPN tunnel in an...
Question 49: Which two processes are responsible on handling Identity Awa...
Question 50: If Jack was concerned about the number of log entries he wou...
Question 51: Which of the following files is used to allow only specific ...
Question 52: The set of rules that governs the types of objects in the di...
Question 53: Which describes the function of the account unit?...
Question 54: You want only RAS signals to pass through H.323 Gatekeeper a...
Question 55: You are running a R77 Security Gateway on GAiA. In case of a...
Question 56: John is upgrading a cluster from NGX R65 to R77. John knows ...
Question 57: MegaCorps' disaster recovery plan is past due for an update ...
Question 58: You are a Security Administrator preparing to deploy a new H...
Question 59: You want to block corporate internal-net and localnet from a...
Question 60: Jacob is using a mesh VPN Community to create a site-to-site...
Question 61: Review the Rule Base displayed. (Exhibit) For which rules wi...
Question 62: What is a possible reason for the grayed out Restore Version...
Question 63: During a Security Management Server migrate export, the syst...
Question 64: Which of the following are valid reasons for beginning with ...
Question 65: Fill in the blank. Type the full fw command and syntax that ...
Question 66: With is the SmartEvent Correlation Unit's function?...
Question 67: Which of the following statements accurately describes the m...
Question 68: When synchronizing clusters, which of the following statemen...
Question 69: Wayne configures an HTTP Security Server to work with the co...
Question 70: What is the command to upgrade a SecurePlatform NG with Appl...
Question 71: By default, what happens to the existing connections on a fi...
Question 72: You want to create an IKE VPN between two VPN-1 NGX Security...
Question 73: You need to back up the routing, interface, and DNS configur...
Question 74: There are times when you want to use Link Selection to manag...
Question 75: Which of the following explains Role Segregation?...
Question 76: What is the command to upgrade an NG with Application Intell...
Question 77: David is the MultiCorp Security Manager and approves the pro...
Question 78: What port is used for Administrator access for your SSL VPN?...
Question 79: Damon enables an SMTP resource for content protection. He no...
Question 80: Which three of the following are ClusterXL member requiremen...
Question 81: When restoring a Security Management Server from a backup fi...
Question 82: How does ClusterXL Unicast mode handle new traffic?...
Question 83: If a SmartUpdate upgrade or distribution operation fails on ...
Question 84: Central License management allows a Security Administrator t...
Question 85: You want VPN traffic to match packets from internal interfac...
Question 86: Your VPN Community includes three Security Gateways. Each Ga...
Question 87: Which of the following does IPSec use during IPSec key negot...
Question 88: How do you verify a VPN Tunnel Interface (VTI) is configured...
Question 89: Which SmartReporter report type is generated from the SmartV...
Question 90: Fill in the blank. To verify the SecureXL status, you would ...
Question 91: Review the cphaprob state command output from a New Mode Hig...
Question 92: When synchronizing clusters, which of the following statemen...
Question 93: When using Captive Portal to send unidentified users to a We...
Question 94: If ClusterXL Load Sharing is enabled with state synchronizat...
Question 95: Which Check Point product is used to create and save changes...
Question 96: Which Security Server can perform authentication tasks, but ...
Question 97: How does a standby SmartCenter Server receive logs from all ...
Question 98: You have just upgraded your Load Sharing gateway cluster (bo...
Question 99: Why should the upgrade_export configuration file (.tgz) be d...
Question 100: Using the Backup Target functionality in SmartProvisioning, ...
Question 101: Which is NOT a method through which Identity Awareness recei...
Question 102: A snapshot delivers a complete backup of GAiA. How do you re...
Question 103: MultiCorp is running Smartcenter R71 on an IPSO platform and...
Question 104: There are several SmartDirectory (LDAP) features that can be...
Question 105: Your current VPN-1 NG with Application Intelligence (Al) R55...
Question 106: Your users are defined in a Windows 2008 Active Directory se...
Question 107: Typically, when you upgrade the Security Management Server, ...
Question 108: Assume an intruder has compromised your current IKE Phase 1 ...
Question 109: If traffic requires preferential treatment by other routers ...
Question 110: Which process is responsible for full synchronization in Clu...
Question 111: Which of the following statements is TRUE concerning MEP VPN...
Question 112: For Management High Availability, if an Active SMS goes down...
Question 113: How do you control the maximum mail messages in a spool dire...
Question 114: Check Point recommends that you back up systems running Chec...
Question 115: Identify the correct step performed by SmartUpdate to upgrad...
Question 116: If both domain-based and route-based VPN's are configured, w...
Question 117: From the following output of cphaprob state, (Exhibit) Which...
Question 118: The process _____ complies $FWDIR/CONF/*.W files into machin...
Question 119: Which protocol can be used to provide logs to third-party re...
Question 120: Which statement is TRUE for route-based VPN's?...
Question 121: What tool exports the Management Configuration into a single...
Question 122: Identify the correct step performed by SmartUpdate to upgrad...
Question 123: Match the SmartDashboard session status icons with the appro...
Question 124: When migrating the SmartEvent data base from one server to a...
Question 125: Which Check Point QoS feature is used to dynamically allocat...
Question 126: Check Point recommends that you back up systems running Chec...
Question 127: What happens when an Administrator activates the DLP Portal ...
Question 128: An Account Unit is the interface between the _____ and the _...
Question 129: Which version is the minimum requirement for SmartProvisioni...
Question 130: Fill in the blank. Complete this statement. To save interfac...
Question 131: When using SmartDashboard to manage existing users in SmartD...
Question 132: In SmartDirectory, what is each LDAP server called?...
Question 133: Restoring a snapshot-created file on one machine that was cr...
Question 134: When using ClusterXL in Load Sharing, what is the default sh...
Question 135: To help organize events, SmartReporter uses filtered queries...
Question 136: Which of the following is NOT part of the policy installatio...
Question 137: What is the consequence of clearing the "Log VoIP Connection...
Question 138: Where do you define NAT properties so that NAT is performed ...
Question 139: When synchronizing clusters, which of the following statemen...
Question 140: Which of the following can NOT be modified by editing the cp...
Question 141: For a dedicated DLP Gateway that runs in inline bridge mode,...
Question 142: You have an internal FTP server, and you allow downloading, ...
Question 143: Review the following list of actions that Security Gateway R...
Question 144: When configuring site-to-site VPN High Availability (HA) wit...
Question 145: What action CANNOT be run from SmartUpdate NGX R65?...
Question 146: In a Windows environment, SmartReporter Data Base settings c...
Question 147: In SmartWorkflow, what is NOT a valid possibility?...
Question 148: A user cannot authenticate to SSL VPN. You have verified the...
Question 149: How many pre-defined exclusions are included by default in S...
Question 150: Typically, when you upgrade the Security Management Server, ...
Question 151: What is the maximum number of cores supported by CoreXL?...
Question 152: Fill in the blank. Type the command and syntax you would use...
Question 153: With the User Directory Software Blade, you can create R77 u...
Question 154: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 155: Which of the following commands do you run on the AD server ...
Question 156: The file snapshot generates is very large, and can only be r...
Question 157: If Bob wanted to create a Management High Availability confi...
Question 158: In a Check Point gateway cluster, are VRRP and ClusterXL mut...
Question 159: How would you configure a rule in a Security Policy to allow...
Question 160: In a Cluster, some features such as VPN only function proper...
Question 161: Fill in the blank. What is the correct command and syntax us...
Question 162: What SmartConsole application allows you to change the Smart...
Question 163: When, during policy installation, does the atomic load task ...
Question 164: When restoring R77 using the command upgrade_import, which o...
Question 165: What is the purpose of the pre-defined exclusions included w...
Question 166: Which command would you use to save the routing information ...
Question 167: To clean the system of all SmartEvent events, you should del...
Question 168: SmartProvisioning uses different types of profiles to manage...
Question 169: When a security administrator logs in to SmartDashboard and ...
Question 170: What is used to validate a digital certificate?...
Question 171: What is the greatest benefit derived from VPNs compared to f...
Question 172: When configuring an LDAP Group object, select the option ___...
Question 173: Fill in the blank. To bind a NIC to a single processor when ...
Question 174: If Jack was concerned about the number of log entries he wou...
Question 175: You are reviewing SmartView Tracker entries, and see a Conne...
Question 176: Greg is creating rules and objects to control VoIP traffic i...
Question 177: Jerry is concerned that a denial-of-service (DoS) attack may...
Question 178: Which Protection Mode does not exist in IPS?...
Question 179: Laura notices the Microsoft Visual Basic Bits Protection is ...
Question 180: What action can be run from SmartUpdate NGX R65?...
Question 181: Your current stands alone VPN-1 NG with Application Intellig...
Question 182: How is change approved for implementation in SmartWorkflow?...
Question 183: By default, the Cluster Control Protocol (CCP) uses this to ...
Question 184: What is the benefit to running SmartEvent in Learning Mode?...
Question 185: What happens in relation to the CRL cache after a cpstop;sps...
Question 186: MegaCorp is using SmartCenter Server with several gateways. ...
Question 187: Which encryption scheme provides in-place encryption?...
Question 188: Which of the following items can be provisioned via a Profil...
Question 189: When upgrading a cluster in Full Connectivity Mode, the firs...
Question 190: A Minimal Effort Upgrade of a cluster:...
Question 191: Concerning these products: SecurePlatform, VPN-1 Pro Gateway...
Question 192: In a UNIX environment, SmartReporter Data Base settings coul...
Question 193: David wants to manage hundreds of gateways using a central m...
Question 194: When do modifications to the Event Policy take effect?...
Question 195: Review the cphaprob state command output from one New Mode H...
Question 196: What is the advantage for deploying SSL VPN in a DMZ, versus...
Question 197: You receive an alert indicating a suspicious FTP connection ...
Question 198: For object-based VPN routing to succeed, what must be config...
Question 199: In the following cluster configuration; if you reboot sglond...
Question 200: Where do you verify that SmartDirectory is enabled?...
Question 201: An organization may be distributed across several SmartDirec...
Question 202: Which of the following is a valid Active Directory designati...
Question 203: What does it mean when a Security Gateway is labeled Untrust...
Question 204: Your customer wishes to install the SmartWorkflow Software B...
Question 205: Where is the ideal place to deploy your SSL VPN?...
Question 206: A cluster contains two members, with external interfaces 172...
Question 207: Regarding QoS guarantees and limits, which of the following ...
Question 208: A customer called to report one cluster member's status as D...
Question 209: How would you set the debug buffer size to 1024?...
Question 210: Which of the following is TRUE concerning numbered VPN Tunne...
Question 211: What happens to the session information after they are appro...
Question 212: _____ generates a SmartEvent Report from its SQL database....
Question 213: What physical machine must have access to the UserCenter pub...
Question 214: You are responsible for the IPS configuration of your Check ...
Question 215: How does a cluster member take over the VIP after a failover...
Question 216: You want to establish a VPN, using certificates. Your VPN wi...
Question 217: Fill in the blank. To view the number of concurrent connecti...
Question 218: To change the default port of the Management Portal:...
Question 219: Which of the following is a TRUE statement concerning contra...
Question 220: Which is the BEST configuration option to protect internal u...
Question 221: The _____ Check Point ClusterXL mode must synchronize the vi...
Question 222: Which of the following is NOT a valid way to view interface'...
Question 223: Which type of service should a Security Administrator use in...
Question 224: Check Point recommends that you back up systems running Chec...
Question 225: Each entry in SmartDirectory has a unique _____....
Question 226: If no flags are defined during a back up on the Security Man...
Question 227: What is NOT true about Management Portal?...
Question 228: MegaCorp has two different types of hardware with Check Poin...
Question 229: When configuring an LDAP Group object, select option _____ i...
Question 230: Which VPN Community object is used to configure VPN routing ...
Question 231: When configuring numbered VPN Tunnel Interfaces (VTIs) in a ...
Question 232: You are preparing computers for a new ClusterXL deployment. ...
Question 233: What is the bit size of DES?
Question 234: Fill in the blank. To verify SecureXL statistics, you would ...
Question 235: Management Portal should be installed on: (i) Management Ser...
Question 236: What is the significance of the depicted icon in the SmartWo...
Question 237: Which file can you modify to change settings of the Manageme...
Question 238: Which network port does PPTP use for communication?...
Question 239: Your expanding network currently includes ClusterXL running ...
Question 240: When migrating the SmartEvent data base from one server to a...
Question 241: Your customer wishes to use SmartWorkflow Software Blade, bu...
Question 242: Match the ClusterXL modes with their configurations. Exhibit...
Question 243: SmartProvisioning can provision the Operating System and net...
Question 244: MEP VPN's use the Proprietary Probing Protocol to send speci...
Question 245: The Management Portal Software Blade allows users to...
Question 246: Does Check Point recommend generating an upgrade_export on s...
Question 247: When using a template to define a user in SmartDirectory, th...
Question 248: Where is it necessary to configure historical records in Sma...
Question 249: Which of the following methods will provide the most complet...
Question 250: The process that performs the authentication for SSL VPN Use...
Question 251: There are times when you want to use Link Selection to manag...
Question 252: Fill in the blank. To provide full connectivity upgrade stat...
Question 253: Which of the following is part of the PKI? Select all that a...
Question 254: Robert has configured a Common Internet File System (CIFS) r...
Question 255: Problems sometimes occur when distributing IPSec packets to ...
Question 256: The process _____ executes the authentication for logging in...
Question 257: What process manages the dynamic routing protocols (OSPF, RI...
Question 258: You can NOT use SmartDashboard's SmartDirectory features to ...
Question 259: Which procedure will create an Internal User?...
Question 260: After installing VPN-1 Pro NGQ R65, you discover that one po...
Question 261: In Company XYZ, the DLP Administrator defined a new Keywords...
Question 262: _____ is NOT an SmartEvent event-triggered Automatic Reactio...
Question 263: When distributing IPSec packets to gateways in a Load Sharin...
Question 264: One profile in SmartProvisioning can update:...
Question 265: Select the right answer to export IPS profiles to copy to an...
Question 266: Fill in the blank. Type the full cphaprob command and syntax...
Question 267: What can be said about RSA algorithms? Select all that apply...
Question 268: What is the correct policy installation process order? 1) Ve...
Question 269: Review the R77 configuration. Is it correct for Management H...
Question 270: Which of the following access options would you NOT use when...
Question 271: Cody is notified by blacklist.org that his site has been rep...
Question 272: You are configuring the VoIP Domain object for a Skinny Clie...
Question 273: You are the MegaCorp Security Administrator. This company us...
Question 274: Which of the following is NOT a LDAP server option in SmartD...
Question 275: You set up a mesh VPN Community, so your internal networks c...
Question 276: The connection to the ClusterXL member 'A' breaks. The Clust...
Question 277: Fill in the blank. Write the full fw command and syntax that...
Question 278: Which of these components does NOT require a VPN-1 NGX R65 l...
Question 279: In ClusterXL, which of the following processes are defined b...
Question 280: What GUI client would you use to view an IPS packet capture?...
Question 281: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 282: Which of the following is supported with Office Mode?...
Question 283: You just upgraded to R71 and are using the IPS Software Blad...
Question 284: While authorization for users managed by SmartDirectory is p...
Question 285: Which of the following statements is TRUE concerning MEP VPN...
Question 286: Yoav is a Security Administrator preparing to implement a VP...
Question 287: You are running the license_upgrade tool on your SecurePlatf...
Question 288: By default, a standby Security Management Server is automati...
Question 289: Where do you verify that SmartDirectory is enabled?...
Question 290: Fill in the blank. To enter the router shell, use command __...
Question 291: Public keys and digital certificates provide which of the fo...
Question 292: VPN traffic control would fall under which VPN component?...
Question 293: You run cphaprob -a if. When you review the output, you find...
Question 294: Using SmartProvisioning Profiles, which of the following cou...
Question 295: Choose the BEST sequence for configuring user management in ...
Question 296: By default Check Point High Availability components send upd...
Question 297: In ClusterXL, _____ is defined by default as a critical devi...
Question 298: How can you prevent delay-sensitive applications, such as vi...
Question 299: You are troubleshooting a HTTP connection problem. You've st...
Question 300: When upgrading to NGX R65, which Check Point products do not...
Question 301: Which of the following SSL Network Extender server-side prer...
Question 302: Which of the following can NOT approve a change in a SmartWo...
Question 303: Mark the configuration options that are available for Data L...
Question 304: For Management High Availability synchronization, what does ...
Question 305: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 306: How could you compare the Fingerprint shown to the Fingerpri...
Question 307: Jon is explaining how the inspection module works to a colle...
Question 308: When does the SmartWorkflow Policy Installation window appea...
Question 309: When Load Sharing Multicast mode is defined in a ClusterXL c...
Question 310: Which of the following are supported with the office mode? S...
Question 311: You plan to install a VPN-1 Pro Gateway for VPN-1 NGX at you...
Question 312: Which statement about LDAP and Active Directory (AD) with SS...
Question 313: Which Check Point tool allows you to open a debug file and s...
Question 314: Which component functions as the Internal Certificate Author...
Question 315: When an Endpoint user is able to authenticate but receives a...
Question 316: If a digital signature is used to achieve both data-integrit...
Question 317: What can you do to see the current number of kernel instance...
Question 318: A Full Connectivity Upgrade of a cluster:...
Question 319: Rachel is the Security Administrator for a university. The u...
Question 320: Control connections between the Security Management Server a...
Question 321: John is configuring a new R77 Gateway cluster but he can not...
Question 322: The process _____ provides service to access the GAIA config...
Question 323: Which of the following would be a result of having more than...
Question 324: When troubleshooting user authentication, you may see the fo...
Question 325: Which of the following does NOT happen when using Pivot Mode...
Question 326: The following rule contains an FTP resource object in the Se...
Question 327: Fill in the blank. MultiCorp is located in Atlanta. It has a...
Question 328: Which of the following CLISH commands would you use to set t...
Question 329: Which Security Servers can perform Content Security tasks, b...
Question 330: _____ is a proprietary Check Point protocol. It is the basis...
Question 331: If SmartWorkflow is configured to work without Sessions or R...
Question 332: What access level cannot be assigned to an Administrator in ...
Question 333: Anytime a client initiates a connection to a server, the fir...
Question 334: In a distributed VPN-1 Pro NGX environment, where is the Int...
Question 335: Stephanie wants to reduce the encryption overhead and improv...
Question 336: The Management Portal allows all of the following EXCEPT:...
Question 337: Which of the following can NOT be done on the Management Por...
Question 338: A customer calls saying that a Load Sharing cluster shows dr...
Question 339: Fill in the blank. In New Mode HA, the internal cluster IP V...
Question 340: The process _____ is responsible for Policy compilation....
Question 341: Which process is responsible for kernel table information sh...
Question 342: You have a production implementation of Management High Avai...
Question 343: The process _____ is responsible for the authentication for ...
Question 344: Check Point New Mode HA is a(n) _____ solution....
Question 345: Fill in the blank. Type the command and syntax that you woul...
Question 346: What is the proper CLISH syntax to configure a default route...
Question 347: When a failed cluster member recovers, which of the followin...
Question 348: MegaCorp is running Smartcenter R70, some Gateways at R65 an...
Question 349: User definitions are stored in _____....
Question 350: What's true about Troubleshooting option in the IPS profile ...
Question 351: You have a High Availability ClusterXL configuration. Machin...
Question 352: Your R7x-series Enterprise Security Management Server is run...
Question 353: Which command would you use to save the interface informatio...
Question 354: How do you check the version of "CPSIZEME" on GAiA?...
Question 355: Which process is responsible for delta synchronization in Cl...
Question 356: Check Point support has asked Tony for a firewall capture of...
Question 357: Check Point recommends deploying SSL VPN:...
Question 358: Which operating system is NOT supported by VPN-1 Secure Clie...
Question 359: Fill in the blanks. To view the number of concurrent connect...
Question 360: You need to determine if your company's Web servers are acce...
Question 361: You are using SmartUpdate to fetch data and perform a remote...
Question 362: Which Check Point product implements a Consolidation Policy?...
Question 363: Which of the following is an example of the hash function?...
Question 364: Which of the following load-balancing methods is not valid?...
Question 365: Which specific R77 GUI would you use to view the length of t...
Question 366: Paul has just joined the MegaCorp security administration te...
Question 367: VPN-1 NGX supports VoIP traffic in all of the following envi...
Question 368: To run GAiA in 64bit mode, which of the following is true? 1...
Question 369: The "MAC Magic" value must be modified under the following c...
Question 370: Provisioning Profiles can NOT be applied to:...
Question 371: Which is NOT a valid option when upgrading Cluster Deploymen...
Question 372: Fill in the blank with a numeric value. The default port num...
Question 373: Your organization maintains several IKE VPN's. Executives in...
Question 374: You want to upgrade an NG with Application Intelligence R55 ...
Question 375: You enable Sweep Scan Protection and Host port scan in IPS t...
Question 376: When using migrate to upgrade a Secure Management Server, wh...
Question 377: What process is responsible for transferring the policy file...
Question 378: What proprietary Check Point protocol is the basis of the fu...
Question 379: Fill in the blank. To stop acceleration on a GAiA Security G...
Question 380: The process _____ is responsible for Management High Availab...
Question 381: Check Point New Mode HA is a(n) _____ solution....
Question 382: What is the primary benefit of using upgrade_export over eit...
Question 383: Fill in the blank. Type the full fw command and syntax that ...
Question 384: Which of the following uses the same key to decrypt as it do...
Question 385: Your primary Security Management Server runs on GAiA. What i...
Question 386: _____ manages Standard Reports and allows the administrator ...
Question 387: When two or more DLP rules are matched, the action taken is ...
Question 388: Organizations are sometimes faced with the need to locate cl...
Question 389: You need to verify the effectiveness of your IPS configurati...
Question 390: SmartWorkflow has been enabled with the following configurat...
Question 391: Select the command set best used to verify proper failover f...
Question 392: In Management High Availability, what is an Active SMS?...
Question 393: Which protocol is not supported for DLP?...
Question 394: The User Directory Software Blade is used to integrate which...
Question 395: Fred is troubleshooting a NAT issue and wants to check to se...
Question 396: John is the MegaCorp Security Administrator, and is using Ch...
Question 397: How do you enable SecureXL (command line) on GAiA?...
Question 398: Fill in the blank. The command useful for debugging by captu...
Question 399: Fill in the blank. In Load Sharing Unicast mode, the interna...
Question 400: VPN-1 NGX includes a resource mechanism for working with the...
Question 401: There are times when you want to use Link Selection to manag...
Question 402: You have to uninstall the Check Point SmartWorkflow Software...
Question 403: What is the most typical type of configuration for VPNs with...
Question 404: Which of the following TCP port numbers is used to connect t...
Question 405: Your current VPN-1 NG with Application Intelligence (AI) R55...
Question 406: You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NG...
Question 407: Your customer asks you about Check Point SmartWorkflow. His ...
Question 408: What process manages the dynamic routing protocols (OSPF, RI...
Question 409: How many events are shown by default in the Event preview pa...
Question 410: What port is used for communication to the UserCenter with S...
Question 411: You are running a VPN-1 NG with Application Intelligence R54...
Question 412: What tools CANNOT be launched from SmartUpdate NGX R65?...
Question 413: How are cached usernames and passwords cleared from the memo...
Question 414: When using IPS, what does Geo protection do?...
Question 415: Steve is troubleshooting a connection problem with an intern...
Question 416: _____ is the called process that starts when opening SmartVi...
Question 417: Included in the customer's network are some firewall systems...
Question 418: What is the supported ClusterXL configuration when configuri...
Question 419: The We-Make-Widgets company has purchased twenty UTM-1 Edge ...
Question 420: Can you implement a complete R77 IPv6 deployment without IPv...
Question 421: Which of the following is NOT a supported browser for Manage...
Question 422: Fill in the blank. In a zero downtime scenario, which comman...
Question 423: You are preparing to configure your VoIP Domain Gatekeeper o...
Question 424: Fill in the blank. Type the command and syntax to view criti...
Question 425: You want to upgrade a SecurePlatform NG with Application Int...
Question 426: Your network traffic requires preferential treatment by othe...
Question 427: What could the following regular expression be used for in a...
Question 428: If you check the box "Use Aggressive Mode", in the IKE Prope...
Question 429: Which Name Resolution protocols are supported in SSL VPN?...
Question 430: When defining SmartDirectory for High Availability (HA), whi...
Question 431: A Zero Downtime Upgrade of a cluster:...
Question 432: What is the best tool to produce a report which represents h...
Question 433: You start the configuration of SmartWorkflow. SmartWorkflow ...
Question 434: Which of the following is TRUE concerning numbered VPN Tunne...
Question 435: You have selected the event Port Scan from Internal Network ...
Question 436: Consider the following actions that VPN-1 NGX can take when ...
Question 437: Fill in the blank. In New Mode HA, the internal cluster IP V...
Question 438: How should Check Point packages be uninstalled?...
Question 439: Fill in the blank. In a zero downtime firewall cluster envir...
Question 440: After you add new interfaces to a cluster, how can you check...
Question 441: Security server configuration settings are stored in _____....
Question 442: Which statement defines Public Key Infrastructure? Security ...
Question 443: Barak is a Security Administrator for an organization that h...
Question 444: Which service type does NOT invoke a Security Server?...
Question 445: A Threat Prevention profile is a set of configurations based...
Question 446: What is the proper command for importing users into the R77 ...
Question 447: What is the best method for scheduling backup's on multiple ...
Question 448: What type of packet does a VPN-1 SecureClient send to its Po...
Question 449: VPN routing can also be configured by editing which file?...
Question 450: If using AD Query for seamless identity data reception from ...
Question 451: A tracked SmartEvent Candidate in a Candidate Pool becomes a...
Question 452: Which application is used to create a File-Share Application...
Question 453: What step should you take before running migrate_export?...
Question 454: Which of the following is the preferred method for adding st...
Question 455: Public-key cryptography is considered which of the following...
Question 456: SmartReporter reports can be used to analyze data from a pen...
Question 457: The relay mail server configured under Email Notifications i...
Question 458: What is the behavior of ClusterXL in a High Availability env...
Question 459: Which command would you use to save the interface informatio...
Question 460: MegaCorp plans to upgrade all of its firewalls. Currently th...
Question 461: Which process should you debug if SmartDashboard login fails...
Question 462: Where can a Security Administrator adjust the unit of measur...
Question 463: Which CLI tool helps on verifying proper ClusterXL sync?...
Question 464: The process _____ is responsible for all other security serv...
Question 465: Which command will only show the number of entries in the co...
Question 466: Refer to the to the network topology below. (Exhibit) You ha...
Question 467: When selecting a backup target using SmartProvisioning, whic...