<< Prev Question Next Question >>

Question 19/75

Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a central and several remote locations which are managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to R80.
What can cause Vanessa unnecessary problems, if she didn't check all requirements for migration to R80?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (75q)
Question 1: Traffic from source 192.168.1.1 is going to www.google.com. ...
1 commentQuestion 2: After making modifications to the $CVPNDIR/conf/cvpnd.C file...
Question 3: What is the difference between SSL VPN and IPSec VPN?...
Question 4: Which command is used to set the CCP protocol to Multicast?...
Question 5: What kind of information would you expect to see using the s...
Question 6: The Event List within the Event tab contains:...
Question 7: What happen when IPS profile is set in Detect Only Mode for ...
Question 8: You notice that your firewall is under a DDoS attack and wou...
Question 9: What is not a component of Check Point SandBlast?...
Question 10: What is the benefit of "tw monitor" over "tcpdump"?...
Question 11: What is the correct command to observe the Sync traffic in a...
Question 12: When using CPSTAT, what is the default port used by the AMON...
Question 13: The CPD daemon is a Firewall Kernel Process that does NOT do...
Question 14: Connections to the Check Point R80 Web API use what protocol...
Question 15: In R80.10, how do you manage your Mobile Access Policy?...
Question 16: In ClusterXL Load Sharing Multicast Mode:...
Question 17: Which of the following Check Point processes within the Secu...
Question 18: For Management High Availability, which of the following is ...
Question 19: Vanessa is firewall administrator in her company. Her compan...
Question 20: Which file gives you a list of all security servers in use, ...
Question 21: How do Capsule Connect and Capsule Workspace differ?...
Question 22: What is the port used for SmartConsole to connect to the Sec...
Question 23: Which command shows the current connections distributed by C...
Question 24: What is true about the IPS-Blade?...
Question 25: Which of the following commands shows the status of processe...
Question 26: What Factor preclude Secure XL Templating?...
Question 27: Which web services protocol is used to communicate to the Ch...
Question 28: Fill in the blank: The "fw monitor" tool can be best used to...
Question 29: Which one of the following is true about Threat Extraction?...
Question 30: What makes Anti-Bot unique compared to other Threat Preventi...
Question 31: What is the protocol and port used for Health Check and Stat...
Question 32: When running a query on your logs, to find records for user ...
Question 33: What is the difference between an event and a log?...
Question 34: Which configuration file contains the structure of the Secur...
1 commentQuestion 35: You noticed that CPU cores on the Security Gateway are usual...
Question 36: R80.10 management server can manage gateways with which vers...
Question 37: Fill in the blank: The R80 feature ______ permits blocking s...
Question 38: Which Mobile Access Application allows a secure container on...
Question 39: When configuring SmartEvent Initial settings, you must speci...
Question 40: What is the recommended configuration when the customer requ...
Question 41: Which of the following will NOT affect acceleration?...
Question 42: The Security Gateway is installed on GAIA R80. The default p...
Question 43: To fully enable Dynamic Dispatcher on a Security Gateway:...
Question 44: What is the mechanism behind Threat Extraction?...
Question 45: Which of the following is NOT a component of Check Point Cap...
Question 46: Sieve is a Cyber Security Engineer working for Global Bank w...
Question 47: Which path below is available only when CoreXL is enabled?...
Question 48: Fill in the blank: The R80 utility fw monitor is used to tro...
Question 49: To accelerate the rate of connection establishment, SecureXL...
Question 50: Which statement is correct about the Sticky Decision Functio...
Question 51: Which is NOT a SmartEvent component?...
Question 52: The Firewall kernel is replicated multiple times, therefore:...
Question 53: What CLI command compiles and installs a Security Policy on ...
Question 54: Which blades and or features are not supported in R80?...
Question 55: SandBlast agent extends 0 day prevention to what part of the...
Question 56: Which command would disable a Cluster Member permanently?...
Question 57: How many images are included with Check Point TE appliance i...
Question 58: ION NO: 254 You have a Gateway is running with 2 cores. You ...
Question 59: In R80 spoofing is defined as a method of:...
Question 60: The fwd process on the Security Gateway sends logs to the fw...
Question 61: How can SmartView application accessed?...
Question 62: Which command collects diagnostic data for analyzing custome...
Question 63: When deploying SandBlast, how would a Threat Emulation appli...
Question 64: To add a file to the Threat Prevention Whitelist, what two i...
Question 65: SSL Network Extender (SNX) is a thin SSL VPN on-demand clien...
Question 66: fwssd is a child process of which of the following Check Poi...
1 commentQuestion 67: When using the Mail Transfer Agent, where are the debug logs...
Question 68: Which command shows actual allowed connections in state tabl...
Question 69: Which statement is true regarding redundancy?...
Question 70: From SecureXL perspective, what are the tree paths of traffi...
Question 71: Tom has been tasked to install Check Point R80 in a distribu...
Question 72: What is the name of the secure application for Mail/Calendar...
1 commentQuestion 73: What scenario indicates that SecureXL is enabled?...
Question 74: What is the minimum amount of RAM needed for a Threat Preven...
Question 75: Fill in the blank: The tool ________ generates a R80 Securit...