<< Prev Question Next Question >>

Question 138/289

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (289q)
Question 1: Which VPN routing option uses VPN routing for every connecti...
Question 2: Bob has finished io setup provisioning a secondary security ...
Question 3: What is the benefit of Manual NAT over Automatic NAT?...
Question 4: Besides fw monitor, what is another command that can be used...
Question 5: SandBlast appliances can be deployed in the following modes:...
Question 6: How does the Anti-Virus feature of the Threat Prevention pol...
Question 7: What is the correct command to observe the Sync traffic in a...
Question 8: What is the command to check the status of Check Point proce...
Question 9: You have pushed policy to GW-3 and now cannot pass traffic t...
Question 10: Which of the following statements about Site-to-Site VPN Dom...
Question 11: You have created a rule at the top of your Rule Base to perm...
Question 12: What are not possible commands to acquire the lock in order ...
Question 13: By default, what type of rules in the Access Control rulebas...
Question 14: Which Check Point daemon monitors the other daemons?...
Question 15: Which command lists all tables in Gaia?...
Question 16: With Mobile Access enabled, administrators select the web-ba...
Question 17: Which of the following is an identity acquisition method tha...
Question 18: How many users can have read/write access in Gaia at one tim...
Question 19: What is the main objective when using Application Control?...
Question 20: Please choose the path to monitor the compliance status of t...
Question 21: When attempting to start a VPN tunnel, in the logs the error...
Question 22: What is the recommended number of physical network interface...
Question 23: What is the difference between an event and a log?...
Question 24: With MTA (Mail Transfer Agent) enabled the gateways manages ...
Question 25: Which 3 types of tracking are available for Threat Preventio...
Question 26: Which encryption algorithm is the least secured?...
Question 27: Which one of the following is true about Threat Extraction?...
Question 28: One of major features in R81 SmartConsole is concurrent admi...
Question 29: What is the benefit of "tw monitor" over "tcpdump"?...
Question 30: When running a query on your logs, to find records for user ...
Question 31: An established connection is going to www.google.com. The Ap...
Question 32: Which two Cluster Solutions are available under R81.20?...
Question 33: Which two of these Check Point Protocols are used by SmartEv...
Question 34: You have successfully backed up Check Point configurations w...
Question 35: Fill in the blank: Authentication rules are defined for ____...
Question 36: Check Point security components are divided into the followi...
Question 37: Which statement is true regarding redundancy?...
Question 38: Sticky Decision Function (SDF) is required to prevent which ...
Question 39: Under which file is the proxy arp configuration stored?...
Question 40: What is the best method to upgrade a Security Management Ser...
Question 41: NAT rules are prioritized in which order? 1. Automatic Stati...
Question 42: At what point is the Internal Certificate Authority (ICA) cr...
Question 43: What component of R81 Management is used for indexing?...
Question 44: Which command can you use to verify the number of active con...
Question 45: You plan to automate creating new objects using new R81 Mana...
Question 46: What is NOT a Cluster Mode?
Question 47: Fill in the blanks: Gaia can be configured using the ______ ...
Question 48: Where is the license for Check Point Mobile users installed?...
Question 49: Firewall polices must be configured to accept VRRP packets o...
Question 50: Which SmartConsole tab is used to monitor network and securi...
Question 51: Which command would you use to set the network interfaces' a...
Question 52: Bob is asked by Alice to disable the SecureXL mechanism temp...
Question 53: Check Point Management (cpm) is the main management process ...
Question 54: What is the SOLR database for?
Question 55: Which CLI command will reset the IPS pattern matcher statist...
Question 56: Using mgmt_cli, what is the correct syntax to import a host ...
Question 57: What is the amount of Priority Queues by default?...
Question 58: Which type of Endpoint Identity Agent includes packet taggin...
Question 59: Kofi, the administrator of the ALPHA Corp network wishes to ...
Question 60: Which of the following Windows Security Events will not map ...
Question 61: Which of the following statements is TRUE about R81 manageme...
Question 62: Which Check Point process provides logging services, such as...
Question 63: When using CPSTAT, what is the default port used by the AMON...
Question 64: What is not a purpose of the deployment of Check Point API?...
Question 65: On R81.20 the IPS Blade is managed by:...
Question 66: Fill in the blank: A ________ VPN deployment is used to prov...
Question 67: Which Check Point software blade provides Application Securi...
Question 68: The Firewall Administrator is required to create 100 new hos...
Question 69: Fill in the blank: The R81 utility fw monitor is used to tro...
Question 70: There are 4 ways to use the Management API for creating host...
Question 71: After having saved the Cllsh Configuration with the "save co...
Question 72: Connections to the Check Point R81 Web API use what protocol...
Question 73: Fill in the blank: Browser-based Authentication sends users ...
Question 74: Aaron is a Syber Security Engineer working for Global Law Fi...
Question 75: The installation of a package via SmartConsole CANNOT be app...
Question 76: To fully enable Dynamic Dispatcher on a Security Gateway:...
Question 77: How many policy layers do Access Control policy support?...
Question 78: What processes does CPM control?...
Question 79: What is the purpose of Captive Portal?...
Question 80: You need to change the number of firewall Instances used by ...
Question 81: Which tool is used to enable ClusterXL?...
Question 82: What is a possible command to delete all of the SSH connecti...
Question 83: Fill in the blank. Once a certificate is revoked from the Se...
Question 84: The CPD daemon is a Firewall Kernel Process that does NOT do...
Question 85: To accelerate the rate of connection establishment, SecureXL...
Question 86: Which is NOT an example of a Check Point API?...
Question 87: Fill in the blank: With the User Directory Software Blade, y...
Question 88: What mechanism can ensure that the Security Gateway can comm...
Question 89: The fwd process on the Security Gateway sends logs to the fw...
Question 90: What is the minimum amount of RAM needed for a Threat Preven...
Question 91: (Exhibit) What can we infer about the recent changes made to...
Question 92: You can access the ThreatCloud Repository from:...
Question 93: During the Check Point Stateful Inspection Process, for pack...
Question 94: In a Client to Server scenario, which inspection point is th...
Question 95: When Configuring Endpoint Compliance Settings for Applicatio...
Question 96: Full synchronization between cluster members is handled by F...
Question 97: What makes Anti-Bot unique compared to other Threat Preventi...
Question 98: What are the two ClusterXL Deployment options?...
Question 99: What is the command to check the status of the SmartEvent Co...
Question 100: Which NAT rules are prioritized first?...
Question 101: Vanessa is expecting a very important Security Report. The D...
Question 102: How many interfaces can you configure to use the Multi-Queue...
Question 103: Vanessa is a Firewall administrator. She wants to test a bac...
Question 104: SSL Network Extender (SNX) is a thin SSL VPN on-demand clien...
Question 105: In which VPN community is a satellite VPN gateway not allowe...
Question 106: What are the two modes for SNX (SSL Network Extender)?...
Question 107: What are the blades of Threat Prevention?...
Question 108: The back-end database for Check Point R81 Management uses:...
Question 109: You have used the "set inactivity-timeout 120" command to pr...
Question 110: Which command shows the current connections distributed by C...
Question 111: When installing a dedicated R81 SmartEvent server. What is t...
Question 112: Which command is used to add users to or from existing roles...
Question 113: Which one of the following is true about Threat Emulation?...
Question 114: Fill in the blank: The R81 feature _____ permits blocking sp...
Question 115: You noticed that CPU cores on the Security Gateway are usual...
Question 116: By default how often updates are checked when the CPUSE Soft...
Question 117: When using the Mail Transfer Agent, where are the debug logs...
Question 118: Which statement is false in respect of the SmartConsole afte...
Question 119: Identify the API that is not supported by Check Point curren...
Question 120: Which of the following is NOT an alert option?...
Question 121: Which of the following is NOT an option to calculate the tra...
Question 122: Which TCP port does the CPM process listen on?...
Question 123: How can you see historical data with cpview?...
Question 124: Fill in the blank: A new license should be generated and ins...
Question 125: Which option, when applied to a rule, allows traffic to VPN ...
Question 126: On R81.20 when configuring Third-Party devices to read the l...
Question 127: What is the protocol and port used for Health Check and Stat...
Question 128: Fill in the blanks: In the Network policy layer, the default...
Question 129: Which Queue in the Priority Queue has the maximum priority?...
Question 130: Which features are only supported with R81.20 Gateways but n...
Question 131: Due to high CPU workload on the Security Gateway, the securi...
Question 132: SmartEvent Security Checkups can be run from the following L...
Question 133: What state is the Management HA in when both members have di...
Question 134: What is the purpose of the CPCA process?...
Question 135: Which of the following statements about SecureXL NAT Templat...
Question 136: While enabling the Identity Awareness blade the Identity Awa...
Question 137: Which command gives us a perspective of the number of kernel...
Question 138: In Logging and Monitoring, the tracking options are Log, Det...
Question 139: Which method below is NOT one of the ways to communicate usi...
Question 140: Which statement is true about ClusterXL?...
Question 141: In SmartConsole, objects are used to represent physical and ...
Question 142: When setting up an externally managed log server, what is on...
Question 143: For best practices, what is the recommended time for automat...
Question 144: When SecureXL is enabled, all packets should be accelerated,...
Question 145: What are the types of Software Containers?...
Question 146: In R81 spoofing is defined as a method of:...
Question 147: SmartEvent provides a convenient way to run common command l...
Question 148: Vanessa is firewall administrator in her company. Her compan...
Question 149: Which command would disable a Cluster Member permanently?...
Question 150: According to the policy installation flow the transfer state...
Question 151: What is the difference between SSL VPN and IPSec VPN?...
Question 152: In R81.20 a new feature dynamic log distribution was added. ...
Question 153: What is the best sync method in the ClusterXL deployment?...
Question 154: What is the command switch to specify the Gaia API context?...
Question 155: You need to see which hotfixes are installed on your gateway...
Question 156: Which of the following will NOT affect acceleration?...
Question 157: What are the correct sleps upgrading a HA cluster (Ml is act...
Question 158: How do you enable virtual mac (VMAC) on-the-fly on a cluster...
Question 159: Selecting an event displays its configurable properties in t...
Question 160: What component of Management is used tor indexing?...
Question 161: You had setup the VPN Community VPN-Stores'with 3 gateways. ...
Question 162: Automation and Orchestration differ in that:...
Question 163: What is the default size of NAT table fwx_alloc?...
Question 164: Which of the following is NOT a valid type of SecureXL templ...
Question 165: What is the port used for SmartConsole to connect to the Sec...
Question 166: Which one of the following is true about Capsule Connect?...
Question 167: In order to get info about assignment (FW, SND) of all CPUs ...
Question 168: View the rule below. What does the lock-symbol in the left c...
Question 169: How is communication between different Check Point component...
Question 170: When defining QoS global properties, which option below is n...
Question 171: An administrator is creating an IPsec site-to-site VPN betwe...
Question 172: What is the base level encryption key used by Capsule Docs?...
Question 173: Rugged appliances are small appliances with ruggedized hardw...
Question 174: Which Check Point software blade provides visibility of user...
Question 175: The Event List within the Event tab contains:...
Question 176: SmartEvent does NOT use which of the following procedures to...
Question 177: What is the mechanism behind Threat Extraction?...
Question 178: What does it mean if Deyra sees the gateway status? (Choose ...
Question 179: In the R81 SmartConsole, on which tab are Permissions and Ad...
Question 180: You want to gather data and analyze threats to your mobile d...
Question 181: Which web services protocol is used to communicate to the Ch...
Question 182: How many layers make up the TCP/IP model?...
Question 183: Which of the following is true regarding the Proxy ARP featu...
Question 184: Which of the following technologies extracts detailed inform...
Question 185: Alice was asked by Bob to implement the Check Point Mobile A...
Question 186: How can you grant GAiAAPI Permissions for a newly created us...
Question 187: Fill in the blank: The "fw monitor" tool can be best used to...
Question 188: By default, how often does Threat Emulation update the engin...
Question 189: What are the minimum open server hardware requirements for a...
Question 190: To help SmartEvent determine whether events originated inter...
Question 191: Which of the following is NOT an attribute of packet acceler...
Question 192: D18912E1457D5D1DDCBD40AB3BF70D5D The system administrator of...
Question 193: What command lists all interfaces using Multi-Queue?...
Question 194: When doing a Stand-Alone Installation, you would install the...
Question 195: When Dynamic Dispatcher is enabled, connections are assigned...
Question 196: After finishing installation admin John likes to use top com...
Question 197: Which one is not a valid upgrade method to R81.20?...
Question 198: John is using Management HA. Which Security Management Serve...
Question 199: The admin is connected via ssh lo the management server. He ...
Question 200: The Correlation Unit performs all but the following actions:...
Question 201: What is the least amount of CPU cores required to enable Cor...
Question 202: From SecureXL perspective, what are the three paths of traff...
Question 203: What level of CPU load on a Secure Network Distributor would...
Question 204: Capsule Connect and Capsule Workspace both offer secured con...
Question 205: Which Correction mechanisms are available with ClusterXL und...
Question 206: Using ClusterXL, what statement is true about the Sticky Dec...
Question 207: How can you switch the active log file?...
Question 208: CPM process stores objects, policies, users, administrators,...
Question 209: Which two Identity Awareness daemons are used to support ide...
Question 210: You have enabled "Full Log" as a tracking option to a securi...
Question 211: Which TCP-port does CPM process listen to?...
Question 212: SandBlast agent extends 0-day prevention to what part of the...
Question 213: What is true about the IPS-Blade?...
Question 214: What does Backward Compatibility mean upgrading the Manageme...
Question 215: Alice &amp; Bob are going to deploy Management Data Plane Se...
Question 216: What happen when IPS profile is set in Detect Only Mode for ...
Question 217: Session unique identifiers are passed to the web api using w...
Question 218: Access roles allow the firewall administrator to configure n...
Question 219: Fill in the blank: The IPS policy for pre-R81 gateways is in...
Question 220: What is the limitation of employing Sticky Decision Function...
Question 221: What is the command to see cluster status in cli expert mode...
Question 222: Sieve is a Cyber Security Engineer working for Global Bank w...
Question 223: What is the Implicit Clean-up Rule?...
Question 224: Alice &amp; Bob are concurrently logged In via SSH on the sa...
Question 225: In the Check Point Firewall Kernel Module, each Kernel is as...
Question 226: SmartEvent has several components that function together to ...
Question 227: What are the attributes that SecureXL will check after the c...
Question 228: Can multiple administrators connect to a Security Management...
Question 229: Which Check Point software blade provides protection from ze...
Question 230: What is the command to show SecureXL status?...
Question 231: Mobile Access Gateway can be configured as a reverse proxy f...
Question 232: What are the methods of SandBlast Threat Emulation deploymen...
Question 233: What is considered Hybrid Emulation Mode?...
Question 234: DLP and Geo Policy are examples of what type of Policy?...
Question 235: Which Check Point feature enables application scanning and t...
Question 236: Bob works for a big security outsourcing provider company an...
Question 237: Pamela is Cyber Security Engineer working for Global Instanc...
Question 238: What is the recommended configuration when the customer requ...
Question 239: What ports are used for SmartConsole to connect to the Secur...
Question 240: In which scenario will an administrator need to manually def...
Question 241: After trust has been established between the Check Point com...
Question 242: What kind of information would you expect to see when using ...
Question 243: fwssd is a child process of which of the following Check Poi...
Question 244: Which command is used to obtain the configuration lock in Ga...
Question 245: Which of the following links will take you to the SmartView ...
Question 246: Which GUI client is supported in R81?...
Question 247: What CLI utility runs connectivity tests from a Security Gat...
Question 248: Which pre-defined Permission Profile should be assigned to a...
Question 249: What are the main stages of a policy installations?...
Question 250: Check Point recommends configuring Disk Space Management par...
Question 251: What is the minimum number of CPU cores required to enable C...
Question 252: Which file gives you a list of all security servers in use, ...
Question 253: What destination versions are supported for a Multi-Version ...
Question 254: Which of the following is a new R81 Gateway feature that had...
Question 255: Both ClusterXL and VRRP are fully supported by Gaia R81.20 a...
Question 256: To add a file to the Threat Prevention Whitelist, what two i...
Question 257: Is it possible to establish a VPN before the user login to t...
Question 258: Which command collects diagnostic data for analyzing a custo...
Question 259: What is true about VRRP implementations?...
Question 260: Alice &amp; Bob are going to use Management Data Plane Separ...
Question 261: What does the "unknown" SIC status shown on SmartConsole mea...
Question 262: SandBlast Mobile identifies threats in mobile devices by usi...
Question 263: Check Pont Central Deployment Tool (CDT) communicates with t...
Question 264: Which command can you use to enable or disable multi-queue p...
Question 265: What command is used to manually failover a cluster during a...
Question 266: You are working with multiple Security Gateways enforcing an...
Question 267: Check Point Management (cpm) is the main management process ...
Question 268: What SmartEvent component creates events?...
Question 269: Bob is going to prepare the import of the exported R81.20 ma...
Question 270: SecureXL is able to accelerate the Connection Rate using tem...
Question 271: Kurt is planning to upgrade his Security Management Server t...
Question 272: Which of the following is NOT a component of Check Point Cap...
Question 273: You have existing dbedit scripts from R77. Can you use them ...
Question 274: Which of the completed statements is NOT true? The WebUI can...
Question 275: To enable Dynamic Dispatch on Security Gateway without the F...
Question 276: What are the three components for Check Point Capsule?...
Question 277: In R81, how do you manage your Mobile Access Policy?...
Question 278: Within the Check Point Firewall Kernel resides Chain Modules...
Question 279: What are the main stages of a policy installation?...
Question 280: How do Capsule Connect and Capsule Workspace differ?...
Question 281: What must you do first if "fwm sic_reset" could not be compl...
Question 282: What is the valid range for VRID value in VRRP configuration...
Question 283: SandBlast has several functional components that work togeth...
Question 284: Can Check Point and Third-party Gateways establish a certifi...
Question 285: Which of the following Check Point processes within the Secu...
Question 286: SecureXL improves non-encrypted firewall traffic throughput ...
Question 287: You find one of your cluster gateways showing "Down" when yo...
Question 288: By default, the R81 web API uses which content-type in its r...
Question 289: Which is not a blade option when configuring SmartEvent?...