<< Prev Question Next Question >>

Question 155/175

One of major features in R81 SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (175q)
Question 1: When Dynamic Dispatcher is enabled, connections are assigned...
Question 2: Fill in the blank: The IPS policy for pre-R81 gateways is in...
Question 3: How many layers make up the TCP/IP model?...
Question 4: Which of the following statements is TRUE about R81 manageme...
Question 5: Which of these is an implicit MEP option?...
Question 6: Which command lists all tables in Gaia?...
Question 7: What does the Log "Views" tab show when SmartEvent is Correl...
Question 8: How do Capsule Connect and Capsule Workspace differ?...
Question 9: Which Check Point process provides logging services, such as...
Question 10: Which statement is NOT TRUE about Delta synchronization?...
Question 11: Which command shows only the table names of all kernel table...
Question 12: Which of the following technologies extracts detailed inform...
Question 13: John detected high load on sync interface. Which is most rec...
Question 14: A user complains that some Internet resources are not availa...
Question 15: Which options are given on features, when editing a Role on ...
Question 16: Firewall polices must be configured to accept VRRP packets o...
Question 17: Which firewall daemon is responsible for the FW CLI commands...
Question 18: Using ClusterXL, what statement is true about the Sticky Dec...
Question 19: Fill in the blank: Browser-based Authentication sends users ...
Question 20: What is the default shell for the command line interface?...
Question 21: You want to gather and analyze threats to your mobile device...
Question 22: Choose the correct syntax to add a new host named "emailserv...
Question 23: What kind of information would you expect to see using the s...
Question 24: What are the steps to configure the HTTPS Inspection Policy?...
Question 25: Which VPN routing option uses VPN routing for every connecti...
Question 26: When attempting to start a VPN tunnel, in the logs the error...
Question 27: Which web services protocol is used to communicate to the Ch...
Question 28: You had setup the VPN Community VPN-Stores'with 3 gateways. ...
Question 29: Check Point Management (cpm) is the main management process ...
Question 30: What key is used to save the current CPView page in a filena...
Question 31: When an encrypted packet is decrypted, where does this happe...
Question 32: What information is NOT collected from a Security Gateway in...
Question 33: Which process is used mainly for backward compatibility of g...
Question 34: Fill in the blank: An identity server uses a __________ for ...
Question 35: You can select the file types that are sent for emulation fo...
Question 36: What solution is Multi-queue intended to provide?...
Question 37: Which Check Point software blades could be enforced under Th...
Question 38: Which 3 types of tracking are available for Threat Preventio...
Question 39: The WebUI offers several methods for downloading hotfixes vi...
Question 40: In the Check Point Firewall Kernel Module, each Kernel is as...
Question 41: Which method below is NOT one of the ways to communicate usi...
Question 42: What is the best method to upgrade a Security Management Ser...
Question 43: Can Check Point and Third-party Gateways establish a certifi...
Question 44: Which command would you use to set the network interfaces' a...
Question 45: Which two of these Check Point Protocols are used by SmartEv...
Question 46: Which TCP port does the CPM process listen on?...
Question 47: What is true about the IPS-Blade?...
Question 48: By default, the R81 web API uses which content-type in its r...
Question 49: Which of the following authentication methods ARE NOT used f...
Question 50: With MTA (Mail Transfer Agent) enabled the gateways manages ...
Question 51: What is the limitation of employing Sticky Decision Function...
Question 52: You have a Gateway is running with 2 cores. You plan to add ...
Question 53: The following command is used to verify the CPUSE version:...
Question 54: How does the Anti-Virus feature of the Threat Prevention pol...
Question 55: Which view is NOT a valid CPVIEW view?...
Question 56: What is the best sync method in the ClusterXL deployment?...
Question 57: You noticed that CPU cores on the Security Gateway are usual...
Question 58: SmartConsole R81 requires the following ports to be open for...
Question 59: What is the difference between an event and a log?...
Question 60: Which Remote Access Client does not provide an Office-Mode A...
Question 61: What is the difference between SSL VPN and IPSec VPN?...
Question 62: What are the modes of SandBlast Threat Emulation deployment?...
Question 63: GAiA Software update packages can be imported and installed ...
Question 64: You want to verify if your management server is ready to upg...
Question 65: Your manager asked you to check the status of SecureXL, and ...
Question 66: What is the command to check the status of the SmartEvent Co...
Question 67: Which NAT rules are prioritized first?...
Question 68: Due to high CPU workload on the Security Gateway, the securi...
Question 69: What is considered Hybrid Emulation Mode?...
Question 70: Which GUI client is supported in R81?...
Question 71: Which one of the following is NOT a configurable Compliance ...
Question 72: Sieve is a Cyber Security Engineer working for Global Bank w...
Question 73: What is the most ideal Synchronization Status for Security M...
Question 74: John is using Management HA. Which Smartcenter should be con...
Question 75: What is true about VRRP implementations?...
Question 76: Please choose correct command to add an "emailserver1" host ...
Question 77: Which of the following Check Point processes within the Secu...
Question 78: What has to be taken into consideration when configuring Man...
Question 79: Within the Check Point Firewall Kernel resides Chain Modules...
Question 80: John is using Management HA. Which Security Management Serve...
Question 81: What is the Implicit Clean-up Rule?...
Question 82: What is the least amount of CPU cores required to enable Cor...
Question 83: To find records in the logs that shows log records from the ...
Question 84: What is Dynamic Balancing?
Question 85: During inspection of your Threat Prevention logs you find fo...
Question 86: Automation and Orchestration differ in that:...
Question 87: What statement best describes the Proxy ARP feature for Manu...
Question 88: What needs to be configured if the NAT property 'Translate d...
Question 89: Which one of these features is NOT associated with the Check...
Question 90: You are the administrator for ABC Corp. You have logged into...
Question 91: The SmartEvent R81 Web application for real-time event monit...
Question 92: Fill in the blanks. There are ________ types of software con...
Question 93: Bob is asked by Alice to disable the SecureXL mechanism temp...
Question 94: In which formats can Threat Emulation forensics reports be v...
Question 95: What is true of the API server on R81.10?...
Question 96: Which is NOT an example of a Check Point API?...
Question 97: What a valid SecureXL paths in R81.10?...
Question 98: What will SmartEvent automatically define as events?...
Question 99: After having saved the Clish Configuration with the "save co...
Question 100: Which feature is NOT provided by all Check Point Mobile Acce...
Question 101: D18912E1457D5D1DDCBD40AB3BF70D5D The system administrator of...
Question 102: How often does Threat Emulation download packages by default...
Question 103: Which tool is used to enable ClusterXL?...
Question 104: After making modifications to the $CVPNDIR/conf/cvpnd.C file...
Question 105: You want to store the GAIA configuration in a file for later...
Question 106: When requiring certificates for mobile devices, make sure th...
Question 107: In which VPN community is a satellite VPN gateway not allowe...
Question 108: You need to change the number of firewall Instances used by ...
Question 109: Which of the following processes pulls the application monit...
Question 110: After trust has been established between the Check Point com...
Question 111: Which command shows the current Security Gateway Firewall ch...
Question 112: Which of the following is NOT a VPN routing option available...
Question 113: What is mandatory for ClusterXL to work properly?...
Question 114: Which one of the following is true about Threat Emulation?...
Question 115: What is the order of NAT priorities?...
Question 116: Which of the following blades is NOT subscription-based and ...
Question 117: Which Check Point feature enables application scanning and t...
Question 118: In SmartConsole, objects are used to represent physical and ...
Question 119: Vanessa is a Firewall administrator. She wants to test a bac...
Question 120: Which of the completed statements is NOT true? The WebUI can...
Question 121: fwssd is a child process of which of the following Check Poi...
Question 122: Can multiple administrators connect to a Security Management...
Question 123: What mechanism can ensure that the Security Gateway can comm...
Question 124: In terms of Order Rule Enforcement, when a packet arrives at...
Question 125: Under which file is the proxy arp configuration stored?...
Question 126: You are investigating issues with to gateway cluster members...
Question 127: The fwd process on the Security Gateway sends logs to the fw...
Question 128: The Correlation Unit performs all but the following actions:...
Question 129: When a packet arrives at the gateway, the gateway checks it ...
Question 130: What are the attributes that SecureXL will check after the c...
Question 131: What is not a component of Check Point SandBlast?...
Question 132: Office mode means that:
Question 133: As a valid Mobile Access Method, what feature provides Capsu...
Question 134: Using mgmt_cli, what is the correct syntax to import a host ...
Question 135: What is the name of the secure application for Mail/Calendar...
Question 136: How many users can have read/write access in Gaia at one tim...
Question 137: You can access the ThreatCloud Repository from:...
Question 138: If a "ping"-packet is dropped by FW1 Policy -on how many ins...
Question 139: CoreXL is supported when one of the following features is en...
Question 140: In order to get info about assignment (FW, SND) of all CPUs ...
Question 141: VPN Link Selection will perform the following when the prima...
Question 142: What is the responsibility of SOLR process on R81.10 managem...
Question 143: Which command lists firewall chain?...
Question 144: What are the main stages of a policy installations?...
Question 145: When users connect to the Mobile Access portal they are unab...
Question 146: What is the purpose of the CPCA process?...
Question 147: When running a query on your logs, to find records for user ...
Question 148: Using Threat Emulation technologies, what is the best way to...
Question 149: Which packet info is ignored with Session Rate Acceleration?...
Question 150: Which software blade does NOT accompany the Threat Preventio...
Question 151: Which command can you use to enable or disable multi-queue p...
Question 152: Which of the following is an identity acquisition method tha...
Question 153: Which features are only supported with R81.10 Gateways but n...
Question 154: What is UserCheck?
Question 155: One of major features in R81 SmartConsole is concurrent admi...
Question 156: The Compliance Blade allows you to search for text strings i...
Question 157: What destination versions are supported for a Multi-Version ...
Question 158: Secure Configuration Verification (SCV), makes sure that rem...
Question 159: You want to allow your Mobile Access Users to connect to an ...
Question 160: SmartEvent Security Checkups can be run from the following L...
Question 161: What is false regarding a Management HA environment?...
Question 162: If the Active Security Management Server fails or if it beco...
Question 163: Connections to the Check Point R81 Web API use what protocol...
Question 164: Which encryption algorithm is the least secured?...
Question 165: To ensure that VMAC mode is enabled, which CLI command shoul...
Question 166: The Check Point history feature in R81 provides the followin...
Question 167: Which statements below are CORRECT regarding Threat Preventi...
Question 168: In R81 spoofing is defined as a method of:...
Question 169: When deploying SandBlast, how would a Threat Emulation appli...
Question 170: What two ordered layers make up the Access Control Policy La...
Question 171: Session unique identifiers are passed to the web api using w...
Question 172: Fill in the blank. Once a certificate is revoked from the Se...
Question 173: What is a feature that enables VPN connections to successful...
Question 174: Both ClusterXL and VRRP are fully supported by Gaia R81.10 a...
Question 175: Which command is used to obtain the configuration lock in Ga...