<< Prev Question Next Question >>

Question 221/237

When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (237q)
Question 1: After having saved the Clish Configuration with the "save co...
Question 2: Which of the following commands shows the status of processe...
Question 3: What is a feature that enables VPN connections to successful...
Question 4: What traffic does the Anti-bot feature block?...
Question 5: To find records in the logs that shows log records from the ...
Question 6: To add a file to the Threat Prevention Whitelist, what two i...
Question 7: Connections to the Check Point R81 Web API use what protocol...
Question 8: Fill in the blank: The tool _____ generates a R81 Security G...
Question 9: What is true about the IPS-Blade?...
Question 10: There are 4 ways to use the Management API for creating host...
Question 11: What are the types of Software Containers?...
Question 12: Where do you create and modify the Mobile Access policy in R...
Question 13: What is the command to see cluster status in cli expert mode...
Question 14: Which Check Point software blades could be enforced under Th...
Question 15: Joey want to configure NTP on R81 Security Management Server...
Question 16: You want to store the GAIA configuration in a file for later...
Question 17: What level of CPU load on a Secure Network Distributor would...
Question 18: When doing a Stand-Alone Installation, you would install the...
Question 19: What is the purpose of a SmartEvent Correlation Unit?...
Question 20: As a valid Mobile Access Method, what feature provides Capsu...
Question 21: Selecting an event displays its configurable properties in t...
Question 22: What Factor preclude Secure XL Templating?...
Question 23: The "MAC magic" value must be modified under the following c...
Question 24: In what way is Secure Network Distributor (SND) a relevant f...
Question 25: What is the minimum number of CPU cores required to enable C...
Question 26: Please choose the path to monitor the compliance status of t...
Question 27: In the Check Point Security Management Architecture, which c...
Question 28: The following command is used to verify the CPUSE version:...
Question 29: What solution is multi-queue intended to provide?...
Question 30: Ken wants to obtain a configuration lock from other administ...
Question 31: Which Check Point software blade provides Application Securi...
Question 32: Which of the SecureXL templates are enabled by default on Se...
Question 33: Which statement is true regarding redundancy?...
Question 34: (Exhibit) What can we infer about the recent changes made to...
Question 35: In what way are SSL VPN and IPSec VPN different?...
Question 36: To fully enable Dynamic Dispatcher on a Security Gateway:...
Question 37: What are possible Automatic Reactions in SmartEvent?...
Question 38: When simulating a problem on ClusterXL cluster with cphaprob...
Question 39: What is the least amount of CPU cores required to enable Cor...
Question 40: If SecureXL is disabled which path is used to process traffi...
Question 41: Alice works for a big security outsourcing provider company ...
Question 42: You notice that your firewall is under a DDoS attack and wou...
Question 43: Which of the following is a task of the CPD process?...
Question 44: Which command shows the current Security Gateway Firewall ch...
Question 45: To accelerate the rate of connection establishment, SecureXL...
Question 46: After some changes in the firewall policy you run into some ...
Question 47: Alice wants to upgrade the current security management machi...
Question 48: What should the admin do in case the Primary Management Serv...
Question 49: Tom has connected to the R81 Management Server remotely usin...
Question 50: Can Check Point and Third-party Gateways establish a certifi...
Question 51: If a "ping"-packet is dropped by FW1 Policy -on how many ins...
Question 52: Which of the following is NOT an attribute of packet acceler...
Question 53: Fill in the blank: Authentication rules are defined for ____...
Question 54: Which of the following is NOT an option to calculate the tra...
Question 55: Which of the following is an identity acquisition method tha...
Question 56: When Configuring Endpoint Compliance Settings for Applicatio...
Question 57: On what port does the CPM process run?...
Question 58: Session unique identifiers are passed to the web api using w...
Question 59: The Firewall Administrator is required to create 100 new hos...
Question 60: From SecureXL perspective, what are the three paths of traff...
Question 61: Advanced Security Checkups can be easily conducted within:...
Question 62: Check Point Support in many cases asks you for a configurati...
Question 63: What are the steps to configure the HTTPS Inspection Policy?...
Question 64: Which of the following technologies extracts detailed inform...
Question 65: What is NOT a Cluster Mode?
Question 66: SandBlast Mobile identifies threats in mobile devices by usi...
Question 67: What is the default size of NAT table fwx_alloc?...
Question 68: Kofi, the administrator of the ALPHA Corp network wishes to ...
Question 69: When defining QoS global properties, which option below is n...
Question 70: (Exhibit) You are the administrator for ABC Corp. You have l...
Question 71: Which statement is true about ClusterXL?...
Question 72: You have existing dbedit scripts from R77. Can you use them ...
Question 73: How many users can have read/write access in Gaia at one tim...
Question 74: What happen when IPS profile is set in Detect Only Mode for ...
Question 75: Which tool is used to enable ClusterXL?...
Question 76: Which statement is correct about the Sticky Decision Functio...
Question 77: You pushed a policy to your gateway and you cannot access th...
Question 78: Gaia has two default user accounts that cannot be deleted. W...
Question 79: The WebUI offers several methods for downloading hotfixes vi...
Question 80: Which command can you use to verify the number of active con...
Question 81: Which process handles connection from SmartConsole R81?...
Question 82: The "Hit count" feature allows tracking the number of connec...
Question 83: When configuring SmartEvent Initial settings, you must speci...
Question 84: Which command lists firewall chain?...
Question 85: Joey wants to upgrade from R75.40 to R81 version of Security...
Question 86: What is the benefit of "tw monitor" over "tcpdump"?...
Question 87: Which Check Point process provides logging services, such as...
Question 88: What are valid authentication methods for mutual authenticat...
Question 89: Automation and Orchestration differ in that:...
Question 90: You find one of your cluster gateways showing "Down" when yo...
Question 91: When SecureXL is enabled, all packets should be accelerated,...
Question 92: Which GUI client is supported in R81?...
Question 93: What processes does CPM control?...
Question 94: Which NAT rules are prioritized first?...
Question 95: How can you switch the active log file?...
Question 96: Fill in the blanks: A _______ license requires an administra...
Question 97: What is the main difference between Threat Extraction and Th...
Question 98: Which of the following is NOT a type of Endpoint Identity Ag...
Question 99: With SecureXL enabled, accelerated packets will pass through...
Question 100: Which of the following type of authentication on Mobile Acce...
Question 101: According to the policy installation flow the transfer state...
Question 102: You need to change the MAC-address on eth2 interface of the ...
Question 103: Which feature is NOT provided by all Check Point Mobile Acce...
Question 104: Check Point Management (cpm) is the main management process ...
Question 105: Main Mode in IKEv1 uses how many packages for negotiation?...
Question 106: You have enabled "Full Log" as a tracking option to a securi...
Question 107: Which of these statements describes the Check Point ThreatCl...
Question 108: How many interfaces can you configure to use the Multi-Queue...
Question 109: What are the available options for downloading Check Point h...
Question 110: In ClusterXL Load Sharing Multicast Mode:...
Question 111: By default how often updates are checked when the CPUSE Soft...
Question 112: Can multiple administrators connect to a Security Management...
Question 113: Which command collects diagnostic data for analyzing custome...
Question 114: Which command lists all tables in Gaia?...
Question 115: You want to allow your Mobile Access Users to connect to an ...
Question 116: What is the main objective when using Application Control?...
Question 117: You have created a rule at the top of your Rule Base to perm...
Question 118: If the Active Security Management Server fails or if it beco...
Question 119: When gathering information about a gateway using CPINFO, wha...
Question 120: Your manager asked you to check the status of SecureXL, and ...
Question 121: What is the SandBlast Agent designed to do?...
Question 122: Which command can you use to enable or disable multi-queue p...
Question 123: What is the default shell for the command line interface?...
Question 124: View the rule below. What does the lock-symbol in the left c...
Question 125: Which of the following is NOT an alert option?...
Question 126: You want to verify if your management server is ready to upg...
Question 127: When a packet arrives at the gateway, the gateway checks it ...
Question 128: Fill in the blank: Browser-based Authentication sends users ...
Question 129: There are multiple types of licenses for the various VPN com...
Question 130: What is the command to check the status of Check Point proce...
Question 131: Native Applications require a thin client under which circum...
Question 132: You want to gather and analyze threats to your mobile device...
Question 133: Which is NOT a SmartEvent component?...
Question 134: The essential means by which state synchronization works to ...
Question 135: When installing a dedicated R81 SmartEvent server. What is t...
Question 136: Vanessa is a Firewall administrator. She wants to test a bac...
Question 137: Which command shows detailed information about VPN tunnels?...
Question 138: How many policy layers do Access Control policy support?...
Question 139: You are working with multiple Security Gateways enforcing an...
Question 140: Which of the following process pulls application monitoring ...
Question 141: What is the difference between an event and a log?...
Question 142: What is required for a certificate-based VPN tunnel between ...
Question 143: Tom has been tasked to install Check Point R81 in a distribu...
Question 144: SandBlast agent extends 0 day prevention to what part of the...
Question 145: What are types of Check Point APIs available currently as pa...
Question 146: In which VPN community is a satellite VPN gateway not allowe...
Question 147: What is the recommended number of physical network interface...
Question 148: Packet acceleration (SecureXL) identities connections by sev...
Question 149: You need to change the MAC-address on eth2 interface of the ...
Question 150: How long may verification of one file take for Sandblast Thr...
Question 151: What command is used to manually failover a cluster during a...
Question 152: Which tool provides a list of trusted files to the administr...
Question 153: What kind of information would you expect to see using the s...
Question 154: Which one of these features is NOT associated with the Check...
Question 155: Bob works for a big security outsourcing provider company an...
Question 156: What is Dynamic Balancing?
Question 157: What will SmartEvent automatically define as events?...
Question 158: Fill in the blank: A ________ VPN deployment is used to prov...
Question 159: What is false regarding a Management HA environment?...
Question 160: You are investigating issues with to gateway cluster members...
Question 161: What are the main stages of a policy installation?...
Question 162: Which of the following statements is TRUE about R81 manageme...
Question 163: Which file contains the host address to be published, the MA...
Question 164: SmartEvent provides a convenient way to run common command l...
Question 165: Which utility allows you to configure the DHCP service on Ga...
Question 166: Fill in the blank: The IPS policy for pre-R81 gateways is in...
Question 167: Return oriented programming (ROP) exploits are detected by w...
Question 168: Secure Configuration Verification (SCV), makes sure that rem...
Question 169: Full synchronization between cluster members is handled by F...
Question 170: Which of the completed statements is NOT true? The WebUI can...
Question 171: What mechanism can ensure that the Security Gateway can comm...
Question 172: What is the amount of Priority Queues by default?...
Question 173: What is not a component of Check Point SandBlast?...
Question 174: Which of the following Central Deployment is NOT a limitatio...
Question 175: Name the file that is an electronically signed file used by ...
Question 176: Which of the following blades is NOT subscription-based and ...
Question 177: The admin lost access to the Gaia Web Management Interface b...
Question 178: Which blades and or features are not supported in R81?...
Question 179: What are the three components for Check Point Capsule?...
Question 180: Which Check Point daemon invokes and monitors critical proce...
Question 181: Which command would disable a Cluster Member permanently?...
Question 182: After having saved the Cllsh Configuration with the "save co...
Question 183: Sticky Decision Function (SDF) is required to prevent which ...
Question 184: SandBlast offers flexibility in implementation based on thei...
Question 185: Check Pont Central Deployment Tool (CDT) communicates with t...
Question 186: When requiring certificates for mobile devices, make sure th...
Question 187: What does the Log "Views" tab show when SmartEvent is Correl...
Question 188: Which SmartEvent component is responsible to collect the log...
Question 189: What are the three SecureXL Templates available in R81.10?...
Question 190: What is not a purpose of the deployment of Check Point API?...
Question 191: How do you enable virtual mac (VMAC) on-the-fly on a cluster...
Question 192: What is the minimum amount of RAM needed for a Threat Preven...
Question 193: UserCheck objects in the Application Control and URL Filteri...
Question 194: Fill in the blank: Identity Awareness AD-Query is using the ...
Question 195: Which of the following will NOT affect acceleration?...
Question 196: Which firewall daemon is responsible for the FW CLI commands...
Question 197: Which command is used to add users to or from existing roles...
Question 198: What is mandatory for ClusterXL to work properly?...
Question 199: What is the command switch to specify the Gaia API context?...
Question 200: Which statement is NOT TRUE about Delta synchronization?...
Question 201: When users connect to the Mobile Access portal they are unab...
Question 202: Security Checkup Summary can be easily conducted within:...
Question 203: Pamela is Cyber Security Engineer working for Global Instanc...
Question 204: In Logging and Monitoring, the tracking options are Log, Det...
Question 205: Traffic from source 192.168.1.1 is going to www.google.com. ...
Question 206: Rugged appliances are small appliances with ruggedized hardw...
Question 207: Which Check Point daemon monitors the other daemons?...
Question 208: Which one of the following is true about Capsule Connect?...
Question 209: There are two R77.30 Security Gateways in the Firewall Clust...
Question 210: In the Check Point Firewall Kernel Module, each Kernel is as...
Question 211: When Identity Awareness is enabled, which identity source(s)...
Question 212: Fill in the blank: The R81 utility fw monitor is used to tro...
Question 213: What are the minimum open server hardware requirements for a...
Question 214: After making modifications to the $CVPNDIR/conf/cvpnd.C file...
Question 215: You had setup the VPN Community VPN-Stores'with 3 gateways. ...
Question 216: What API command below creates a new host object with the na...
Question 217: Which method below is NOT one of the ways to communicate usi...
Question 218: What is a possible command to delete all of the SSH connecti...
Question 219: The Check Point history feature in R81 provides the followin...
Question 220: What is the benefit of Manual NAT over Automatic NAT?...
Question 221: When running a query on your logs, to find records for user ...
Question 222: Automatic affinity means that if SecureXL is running, the af...
Question 223: Which member of a high-availability cluster should be upgrad...
Question 224: When using CPSTAT, what is the default port used by the AMON...
Question 225: Which command shows actual allowed connections in state tabl...
Question 226: You have a Gateway is running with 2 cores. You plan to add ...
Question 227: Due to high CPU workload on the Security Gateway, the securi...
Question 228: How many layers make up the TCP/IP model?...
Question 229: The Firewall kernel is replicated multiple times, therefore:...
Question 230: Choose the correct syntax to add a new host named "emailserv...
Question 231: Kurt is planning to upgrade his Security Management Server t...
Question 232: In order to get info about assignment (FW, SND) of all CPUs ...
Question 233: What is the purpose of extended master key extension/session...
Question 234: Which configuration file contains the structure of the Secur...
Question 235: Which is not a blade option when configuring SmartEvent?...
Question 236: A user complains that some Internet resources are not availa...
Question 237: Which 3 types of tracking are available for Threat Preventio...