Valid 156-915.77 Dumps shared by ExamDiscuss.com for Helping Passing 156-915.77 Exam! ExamDiscuss.com now offer the newest 156-915.77 exam dumps, the ExamDiscuss.com 156-915.77 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 156-915.77 dumps with Test Engine here:

Access 156-915.77 Dumps Premium Version
(850 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 151/812

Which of the following generates a Smart Event Report from its SQL database?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (812q)
Question 1: Which of the following are valid PKI architectures?...
Question 2: In Cluster XL, which of the following processes are defined ...
Question 3: What mechanism does a gateway configured with Identity Aware...
Question 4: Using IPS, how do you notify the Security Administrator that...
Question 5: Which two processes are responsible on handling Identity Awa...
Question 6: Which of the following statements about SSL VPN is TRUE?...
Question 7: What are the Smart Provisioning Policy Status indicators?...
Question 8: Smart Provisioning can provision the Operating System and ne...
Question 9: Many companies have defined more than one administrator. To ...
Question 10: To change the default port of the Management Portal:...
Question 11: You logged in to your firewall and discovered that the sched...
Question 12: You want to upgrade a cluster with two members to VPN-1 NGX....
Question 13: After Travis added new processing cores on his server, Core ...
Question 14: Why should the upgrade export configuration file (.tgz) be d...
Question 15: You set up a mesh VPN Community, so your internal networks c...
Question 16: What is the proper command for importing users into the R76 ...
Question 17: How do you control the maximum mail messages in a spool dire...
Question 18: With is the Smart Event Correlation Unit's function?...
Question 19: To clean the system of all events, you should delete the fil...
Question 20: John Adams is an HR partner in the ACME organization. ACME I...
Question 21: In Management High Availability, what is an Active SMS?...
Question 22: SSL termination takes place:
Question 23: The process ___________ is responsible for all other securit...
Question 24: How is the Smart Workflow Session Information Pane enabled?...
Question 25: What step should you take before running upgrade export?...
Question 26: Which of the following is a valid Active Directory designati...
Question 27: Looking at the SYN packets in the Wire shark output, select ...
Question 28: What is the command to show OSPF adjacencies?...
Question 29: While using the Smart Provisioning Wizard to create a new pr...
Question 30: You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NG...
Question 31: In Cluster XL, which of the following are defined by default...
Question 32: Problems sometimes occur when distributing IPSec packets to ...
Question 33: What is the most typical type of configuration for VPNs with...
Question 34: You are running a VPN-1 NG with Application Intelligence R54...
Question 35: Can the smallest appliance handle all Blades simultaneously?...
Question 36: The process ________ is responsible for Policy compilation....
Question 37: You are Mega Corp's Security Administrator. There are variou...
Question 38: Which of the following can NOT be modified by editing the cp...
Question 39: You configure a Check Point QoS Rule Base with two rules: an...
Question 40: The file snapshot generates is very large, and can only be r...
Question 41: How can you disable Secure XL via the command line (it does ...
Question 42: SIMULATION Type the command and syntax to configure the Clus...
Question 43: Which of the following statements accurately describes the m...
Question 44: The Smart Event Correlation Unit:...
Question 45: There are times when you want to use Link Selection to manag...
Question 46: If a Smart Update upgrade or distribution operation fails on...
Question 47: The Smart Event Server:
Question 48: Refer to the network topology below. (Exhibit) You have IPS ...
Question 49: An organization may be distributed across several Smart Dire...
Question 50: SIMULATION Fill in the blank. You can set Acceleration to ON...
Question 51: Which of these four Check Point QoS technologies prevents th...
Question 52: Can you implement a complete IPv6 deployment without IPv4 ad...
Question 53: Which of the following is the preferred method for adding st...
Question 54: You plan to migrate a VPN-1 NG with Application Intelligence...
Question 55: To backup all events stored in the Smart Event Server, you s...
Question 56: You have selected the event Port Scan from Internal Network ...
Question 57: When a failed cluster member recovers, which of the followin...
Question 58: The Smart Event Server:
Question 59: Which answers are TRUE? Automatic Static NAT CANNOT be used ...
Question 60: A snapshot delivers a complete backup of GAiA. How do you re...
Question 61: If Bob wanted to create a Management High Availability confi...
Question 62: There are times when you want to use Link Selection to manag...
Question 63: Restoring a snapshot-created file on one machine that was cr...
Question 64: Which technology would describe RDED for Qos?...
Question 65: Jennifer McHanry is CEO of ACME. She recently bought her own...
Question 66: If the number of kernel instances for Core XL shown is 6, ho...
Question 67: You are preparing computers for a new Cluster XL deployment....
Question 68: You are responsible for the configuration of Mega Corp's Che...
Question 69: Match the Cluster XL modes with their configurations. Exhibi...
Question 70: Which CLI tool helps on verifying proper Cluster XL sync?...
Question 71: Which component functions as the Internal Certificate Author...
Question 72: Which of the following statements is TRUE concerning MEP VPN...
Question 73: Which process should you debug if Smart Dashboard login fail...
Question 74: Your company is planning on moving their server farm to a ne...
Question 75: Which operating systems are supported by a Check Point Secur...
Question 76: Multi Corp is located in Atlanta. It has a branch office in ...
Question 77: When two or more DLP rules are matched, the action taken is ...
Question 78: Which VPN Community object is used to configure VPN routing ...
Question 79: Which of the following is NOT TRUE regarding HTTPS traffic b...
Question 80: What action CANNOT be run from Smart Update NGX R65?...
Question 81: Refer to Exhibit below: (Exhibit) Match the Cluster XL modes...
Question 82: Check Point Clustering protocol, works on:...
Question 83: Control connections between the Security Management Server a...
Question 84: You have created a Rule Base for firewall, websydney. Now yo...
Question 85: All of the following are used by the DLP engine to match a m...
Question 86: For Management High Availability synchronization, what does ...
Question 87: What type of object may be explicitly defined as a MEP VPN?...
Question 88: Barak is a Security Administrator for an organization that h...
Question 89: Which of the following is NOT a supported browser for Manage...
Question 90: When configuring a Web Application for SSL VPN remote access...
Question 91: You want only RAS signals to pass through H.323 Gatekeeper a...
Question 92: Which of the following commands can be used to stop Manageme...
Question 93: When synchronizing clusters, which of the following statemen...
Question 94: In a "zero downtime" scenario, which command do you run manu...
Question 95: Which of the following is NOT a LDAP server option in Smart ...
Question 96: __________ is NOT a Cluster XL mode....
Question 97: Which of the following uses the same key to decrypt as it do...
Question 98: Check Point support has asked Tony for a firewall capture of...
Question 99: From the following output of cphaprob state, (Exhibit) which...
Question 100: When selecting a backup target using Smart Provisioning, whi...
Question 101: Smart Provisioning is an integral part of the Security Manag...
Question 102: You have three servers located in a DMZ, using private IP ad...
Question 103: You have to uninstall the Check Point Smart Workflow Softwar...
Question 104: How is Smart Workflow disabled?...
Question 105: To back up all events stored in the Smart Event Server, you ...
Question 106: By default, what happens to the existing connections on a fi...
Question 107: Which of the following is TRUE concerning numbered VPN Tunne...
Question 108: Which statement is TRUE for route-based VPN's?...
Question 109: In Company XYZ, the DLP Administrator defined a new template...
Question 110: Exhibit: (Exhibit) UserA is able to create a Smart LSM Secur...
Question 111: Which command would you use to save the interface informatio...
Question 112: The process _______ provides service to access the GAIA conf...
Question 113: When upgrading a cluster in Full Connectivity Mode, the firs...
Question 114: What is the Smart Event Correlation Unit's function?...
Question 115: If no flags are defined during a back up on the Security Man...
Question 116: Susan needs to change the DNS settings on her Secure Platfor...
Question 117: How are cached usernames and passwords cleared from the memo...
Question 118: Given the following protection detailed and the enforcing ga...
Question 119: What is the reason for the following error? (Exhibit)...
Question 120: SIMULATION To stop acceleration on a GAiA Security Gateway, ...
Question 121: Your online bookstore has customers connecting to a variety ...
Question 122: Review the following list of actions that Security Gateway R...
Question 123: Which of the following does NOT happen when using Pivot Mode...
Question 124: When migrating the Smart Event data base from one server to ...
Question 125: What is the bit size of DES?
Question 126: Which Security Servers can perform Content Security tasks, b...
Question 127: SIMULATION Fill in the blanks. To view the number of concurr...
Question 128: How would you set the debug buffer size to 1024?...
Question 129: Which utility or command is useful for debugging by capturin...
Question 130: Which of the following is a CLI command for Security Gateway...
Question 131: If both domain-based and route-based VPN's are configured, w...
Question 132: Organizations are sometimes faced with the need to locate cl...
Question 133: Which of the following statements is FALSE regarding OSPF co...
Question 134: Review the cphaprob state command output from a New Mode Hig...
Question 135: Which of the following is NOT an advantage of Smart Log?...
Question 136: Which of the following commands can be used to troubleshoot ...
Question 137: You just installed a new Web server in the DMZ that must be ...
Question 138: A customer called to report one cluster member's status as D...
Question 139: SIMULATION Fill in the blank. In New Mode HA, the internal c...
Question 140: Your expanding network currently includes Cluster XL running...
Question 141: When using a template to define a Smart Directory, where sho...
Question 142: Which of the following is a supported Sticky Decision Functi...
Question 143: The following graphic illustrates which command being issued...
Question 144: What port is used for Administrator access for your SSL VPN?...
Question 145: Included in the customer's network are some firewall systems...
Question 146: You need to determine if your company's Web servers are acce...
Question 147: Your customer wishes to install the Smart Workflow Software ...
Question 148: If you need strong protection for the encryption of user dat...
Question 149: Which network port does PPTP use for communication?...
Question 150: Your company has the requirement that Smart Event reports sh...
Question 151: Which of the following generates a Smart Event Report from i...
Question 152: Use the table to match the BEST Management High Availability...
Question 153: Which of the following statements is FALSE about the DLP Sof...
Question 154: Which process is responsible for full synchronization in Clu...
Question 155: Paul has just joined the Mega Corp security administration t...
Question 156: Can end users be forced to authenticate by using client cert...
Question 157: Select the correct statement about Secure Internal Communica...
Question 158: What happens in relation to the CRL cache after a cpstop;sps...
Question 159: John is upgrading a cluster from NGX R65 to R76. John knows ...
Question 160: Multi Corp is running Smart center R71 on an IPSO platform a...
Question 161: Included in the client's network are some switches, which re...
Question 162: You configure a Check Point QoS Rule Base with two rules: an...
Question 163: When you add a resource service to a rule, which ONE of the ...
Question 164: What cluster mode is represented in this case? (Exhibit)...
Question 165: Which of the following software blades can be used to provid...
Question 166: While authorization for users managed by Smart Directory is ...
Question 167: How many events are shown by default in the Event preview pa...
Question 168: What is the purpose of the pre-defined exclusions included w...
Question 169: Peter is your new Security Administrator. On his first worki...
Question 170: Where is the encryption domain for a Smart LSM Security Gate...
Question 171: Anytime a client initiates a connection to a server, the fir...
Question 172: You plan to install a VPN-1 Pro Gateway for VPN-1 NGX at you...
Question 173: A Minimal Effort Upgrade of a cluster:...
Question 174: In a Cluster, some features such as VPN only function proper...
Question 175: What is used to validate a digital certificate?...
Question 176: When synchronizing clusters, which of the following statemen...
Question 177: Your primary Smart Center Server is installed on a Secure Pl...
Question 178: Which method of load balancing describes "Round Robin"?...
Question 179: The London office just upgraded their DNS servers so their G...
Question 180: Check Point recommends that you back up systems running Chec...
Question 181: In an R76 Cluster, some features such as VPN only function p...
Question 182: Which of the following can NOT be done on the Management Por...
Question 183: By default, a standby Security Management Server is automati...
Question 184: You run cphaprob -a if. When you review the output, you find...
Question 185: What is a task of the Smart Event Correlation Unit?...
Question 186: You are using Smart Update to fetch data and perform a remot...
Question 187: What happens when an Administrator activates the DLP Portal ...
Question 188: The process that performs the authentication for SSL VPN Use...
Question 189: When migrating the Smart Event data base from one server to ...
Question 190: Which method of load balancing describes "Round Robin"?...
Question 191: You are preparing to configure your VoIP Domain Gatekeeper o...
Question 192: Remote clients are using SSL VPN to authenticate via LDAP se...
Question 193: SIMULATION Type the command and syntax to view critical devi...
Question 194: True or false? After creating a snapshot of a Windows 2003 S...
Question 195: _________ is the called process that starts when opening Sma...
Question 196: Which command provides cluster upgrade status?...
Question 197: For Management High Availability, if an Active SMS goes down...
Question 198: You are establishing a Cluster XL environment, with the foll...
Question 199: John is configuring a new R76 Gateway cluster but he can not...
Question 200: In a R76 Management High Availability (HA) configuration, yo...
Question 201: John is the Multi Corp Security Administrator. If he suggest...
Question 202: Refer to the to the network topology below. (Exhibit) You ha...
Question 203: Which Remote Desktop protocols are supported natively in SSL...
Question 204: Typically, when you upgrade the Security Management Server, ...
Question 205: After implementing Static Address Translation to allow Inter...
Question 206: Management Portal should be installed on: (i) Management Ser...
Question 207: Which technology is responsible for assembling packet stream...
Question 208: Access Role objects define users, machines, and network loca...
Question 209: How many pre-defined exclusions are included by default in S...
Question 210: _______________ manages Standard Reports and allows the admi...
Question 211: The connection to the first Cluster XL member breaks. The fi...
Question 212: You have selected the event Port Scan from Internal Network ...
Question 213: VPN traffic control would fall under which VPN component?...
Question 214: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 215: Typically, when you upgrade the Security Management Server, ...
Question 216: In a R76 Cluster XL Load Sharing configuration, which type o...
Question 217: A Web server behind the Security Gateway is set to Automatic...
Question 218: SIMULATION To provide cluster upgrade status, use command...
Question 219: Your expanding network currently includes Cluster XL running...
Question 220: SIMULATION Fill in the blank. In New Mode HA, the internal c...
Question 221: Robert has configured a Common Internet File System (CIFS) r...
Question 222: You receive an alert indicating a suspicious FTP connection ...
Question 223: What is the offline CPSIZEME upload procedure?...
Question 224: Does Check Point recommend generating an upgrade export on s...
Question 225: What is NOT true about Management Portal?...
Question 226: When deploying a dedicated DLP Gateway behind a perimeter fi...
Question 227: A snapshot delivers a complete backup of Secure Platform. Th...
Question 228: How do you verify the Check Point kernel running on a firewa...
Question 229: A user attempts to initialize a network application using SS...
Question 230: How do you block some seldom-used FTP commands, such as CWD,...
Question 231: Which Security Gateway R76 configuration setting forces the ...
Question 232: Which of the following is a valid Active Directory designati...
Question 233: The Smart Event Client:
Question 234: What type of traffic can be re-directed to the Captive Porta...
Question 235: Which of the following log files contains verbose informatio...
Question 236: What is the default port number for Secure Sockets Layer con...
Question 237: If you check the box "Use Aggressive Mode", in the IKE Prope...
Question 238: In a zero downtime firewall cluster environment what command...
Question 239: A Zero Downtime Upgrade of a cluster:...
Question 240: How can you verify that Secure XL is running?...
Question 241: What is the Smart Event Analyzer's function?...
Question 242: In Smart Directory, what is each LDAP server called?...
Question 243: John is the Mega Corp Security Administrator, and is using C...
Question 244: Which of the following is NOT accelerated by Secure XL?...
Question 245: You are a Security Administrator preparing to deploy a new H...
Question 246: You want to upgrade a cluster with two members to R76. The S...
Question 247: What are the Smart Provisioning Provisioning Profile indicat...
Question 248: For object-based VPN routing to succeed, what must be config...
Question 249: Why would an old Connecter Gateway IP be displayed to remote...
Question 250: When configuring an LDAP Group object, which option should y...
Question 251: Which of the following statements is TRUE concerning MEP VPN...
Question 252: Which of the following manages Standard Reports and allows t...
Question 253: Which of the following load-balancing methods is not valid?...
Question 254: Identify the correct step performed by Smart Update to upgra...
Question 255: SIMULATION Fill in the blank. To verify that a VPN Tunnel is...
Question 256: An Account Unit is the interface between the __________ and ...
Question 257: SIMULATION Fill in the blank. What is the correct command an...
Question 258: Which OPSEC server is used to prevent users from accessing c...
Question 259: What command will stop all (and only) Management Portal serv...
Question 260: Where multiple Smart Directory servers exist in an organizat...
Question 261: Which command line interface utility allows the administrato...
Question 262: At what router prompt would you save your OSPF configuration...
Question 263: You want to implement Static Destination NAT in order to pro...
Question 264: There are times when you want to use Link Selection to manag...
Question 265: An administrator has installed the latest HFA on the system ...
Question 266: Smart Reporter reports can be used to analyze data from a pe...
Question 267: Your customer asks you about Check Point Smart Workflow. His...
Question 268: Which of the following commands shows full synchronization s...
Question 269: In Cluster XL, _______ is defined by default as a critical d...
Question 270: Which type of routing relies on a VPN Tunnel Interface (VTI)...
Question 271: Choose the BEST sequence for configuring user management in ...
Question 272: You have installed Secure Platform R76 as Security Gateway o...
Question 273: The Management Portal Software Blade allows users to...
Question 274: Which of the following QoS rule action properties is an Adva...
Question 275: The process that performs the authentication for legacy sess...
Question 276: Which specific R76 GUI would you use to view the length of t...
Question 277: When using Cluster XL in Load Sharing, what is the default m...
Question 278: Security server configuration settings are stored in _______...
Question 279: Due to some recent performance issues, you are asked to add ...
Question 280: Which of the following is the default port for Management Po...
Question 281: Match the VPN-related terms with their definitions: (Exhibit...
Question 282: When using IPS, what does Geo protection do?...
Question 283: What happens to the session information after they are appro...
Question 284: SIMULATION Fill in the blank. To enter the router shell, use...
Question 285: Which of the following commands shows full synchronization s...
Question 286: If Smart Workflow is configured to work without Sessions or ...
Question 287: Which service type does NOT invoke a Security Server?...
Question 288: How do you run "CPSIZEME" on SPLAT?...
Question 289: Which of the following items should be configured for the Se...
Question 290: What is the greatest benefit derived from VPNs compared to f...
Question 291: Which of the following would be a result of having more than...
Question 292: SIMULATION Type the full fw command and syntax that will sho...
Question 293: When, during policy installation, does the atomic load task ...
Question 294: You enable Sweep Scan Protection and Host port scan in IPS t...
Question 295: You are the Security Administrator for ABC-Corp. A Check Poi...
Question 296: Which specific R76 GUI would you use to view the length of t...
Question 297: What is a requirement for setting up R76 Management High Ava...
Question 298: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 299: What gives administrators more flexibility when configuring ...
Question 300: The Identity Agent is a lightweight endpoint agent that auth...
Question 301: DShield is a Check Point feature used to block which of the ...
Question 302: Multi Corp has bought company Omni Corp and now has two acti...
Question 303: You enable Hide NAT on the network object, 10.1.1.0 behind t...
Question 304: When configuring an LDAP Group object, select option _______...
Question 305: Which of the following statements is TRUE concerning MEP VPN...
Question 306: Jerry is concerned that a denial-oF. service (DoS) attack ma...
Question 307: When configuring an LDAP Group object, which option should y...
Question 308: Each entry in Smart Directory has a unique _______________ ?...
Question 309: __________ is a proprietary Check Point protocol. It is the ...
Question 310: A host on the Internet initiates traffic to the Static NAT I...
Question 311: In R76, My Organization e-mail addresses or domains are used...
Question 312: Your perimeter Security Gateway's external IP is 200.200.200...
Question 313: A Cluster XL configuration is limited to ___ members....
Question 314: Which command would you use to save the routing information ...
Question 315: User definitions are stored in ________________ ....
Question 316: What is the maximum number of cores supported by Core XL?...
Question 317: Which of these is a type of acceleration in Secure XL?...
Question 318: In New Mode HA, the internal cluster IP VIP address is 10.4....
Question 319: Which procedure will create an Internal User?...
Question 320: Which application is used to create a File-Share Application...
Question 321: When using AD Query to authenticate users for Identity Aware...
Question 322: Which process is responsible for delta synchronization in Cl...
Question 323: Which procedure enables the SSL VPN blade on the gateway?...
Question 324: Which version is the minimum requirement for Smart Provision...
Question 325: The We-Make-Widgets company has purchased twenty UTM-1 Edge ...
Question 326: What process manages the dynamic routing protocols (OSPF, RI...
Question 327: Which Check Point QoS feature allows a Security Administrato...
Question 328: Which of the following explains Role Segregation?...
Question 329: What is the benefit to running Smart Event in Learning Mode?...
Question 330: When using migrate to upgrade a Secure Management Server, wh...
Question 331: A Security Administrator opens a new session, makes changes ...
Question 332: You want to create an IKE VPN between two VPN-1 NGX Security...
Question 333: Which Protection Mode does not exist in IPS?...
Question 334: How does a standby Smart Center Server receive logs from all...
Question 335: What is the benefit to running Smart Event in Learning Mode?...
Question 336: You want to block corporate internal-net and local net from ...
Question 337: Which of the following log files contains information about ...
Question 338: Which three of the following are Cluster XL member requireme...
Question 339: Check Point New Mode HA is a(n) _________ solution....
Question 340: When migrating the Smart Event data base from one server to ...
Question 341: Check Point recommends that you back up systems running Chec...
Question 342: MEP VPN's use the Proprietary Probing Protocol to send speci...
Question 343: Your customer, Mr. Smith needs access to other networks and ...
Question 344: Which of the following allows administrators to allow or den...
Question 345: Charles requests a Website while using a computer not in the...
Question 346: You are a SSL VPN Administrator. Your users complain that th...
Question 347: Which of the following tools is used to generate a Security ...
Question 348: SIMULATION To provide full connectivity upgrade status, use ...
Question 349: What configuration change must you make to change an existin...
Question 350: Which of the following SSL Network Extender server-side prer...
Question 351: In a distributed VPN-1 Pro NGX environment, where is the Int...
Question 352: When defining Smart Directory for High Availability (HA), wh...
Question 353: The technical-support department has a requirement to access...
Question 354: In order to have full control, you decide to use Manual NAT ...
Question 355: Micro Corp experienced a security appliance failure. (LEDs o...
Question 356: How do you upload the results of "CPSIZEME" to Check Point w...
Question 357: Identity Agent is a lightweight endpoint agent that authenti...
Question 358: After repairing a Smart Workflow session:...
Question 359: Which Check Point address translation method is necessary if...
Question 360: Match the Cluster XL modes with their configurations. Exhibi...
Question 361: Check Point recommends deploying SSL VPN:...
Question 362: To configure the Cluster Control Protocol (CCP) to use Broad...
Question 363: Which Security Server can perform authentication tasks, but ...
Question 364: Which of the following is a TRUE statement concerning contra...
Question 365: How is Smart Workflow enabled?
Question 366: What is the meaning of the option Connect to the Internet?...
Question 367: Which command displays the installed Security Gateway versio...
Question 368: Using the Backup Target functionality in Smart Provisioning,...
Question 369: Regarding QoS guarantees and limits, which of the following ...
Question 370: You want to generate a cpinfo file via CLI on a system runni...
Question 371: What command will allow you to disable sync on a cluster fir...
Question 372: The process __________ is responsible for the authentication...
Question 373: When upgrading Check Point products in a distributed environ...
Question 374: By default Check Point High Availability components send upd...
Question 375: Which of the following statements accurately describes the c...
Question 376: Which statement is TRUE for route-based VPN's?...
Question 377: You enable Automatic Static NAT on an internal host node obj...
Question 378: What is the best tool to produce a report which represents h...
Question 379: Which Check Point tool allows you to open a debug file and s...
Question 380: How do new connections get established through a Security Ga...
Question 381: Mega Corp is using Smart Center Server with several gateways...
Question 382: Which of the following are valid reasons for beginning with ...
Question 383: Jacob is using a mesh VPN Community to create a sitE. to-sit...
Question 384: What command with appropriate switches would you use to test...
Question 385: You intend to upgrade a Check Point Gateway from R65 to R76....
Question 386: The following configuration is for VPN-1 NGX:1s this configu...
Question 387: If Jack was concerned about the number of log entries he wou...
Question 388: Provisioning Profiles can NOT be applied to:...
Question 389: Rachel is the Security Administrator for a university. The u...
Question 390: What is a requirement for setting up R76 Management High Ava...
Question 391: Which command would you use to save the interface informatio...
Question 392: The relay mail server configured under Email Notifications i...
Question 393: Where do you verify that Smart Directory is enabled?...
Question 394: Which of the following commands can be used to bind a NIC to...
Question 395: What is the best method for scheduling backup's on multiple ...
Question 396: An internal host initiates a session to www.google.com and i...
Question 397: Which of the following is NOT a feature of Cluster XL?...
Question 398: Match the following commands to their correct function. Each...
Question 399: Among the authentication schemes SSL VPN employs for users, ...
Question 400: The set of rules that governs the types of objects in the di...
Question 401: SIMULATION Type the command and syntax that you would use to...
Question 402: What type of packet does a VPN-1 Secure Client send to its P...
Question 403: You must set up SIP with a proxy for your network. IP phones...
Question 404: In a UNIX environment, Smart Reporter Data Base settings cou...
Question 405: Your users are defined in a Windows 2008 Active Directory se...
Question 406: Which of the following is a valid Active Directory designati...
Question 407: Which protocol can be used to provide logs to third-party re...
Question 408: SIMULATION Fill in the blank. In Load Sharing Unicast mode, ...
Question 409: You have three Gateways in a mesh community. Each gateway's ...
Question 410: John Adams is an HR partner in the ACME organization. ACME I...
Question 411: When restoring R76 using the command upgrade import, which o...
Question 412: You find that Gateway fw2 can NOT be added to the cluster ob...
Question 413: Which operating system(s) support(s) unnumbered VPN Tunnel I...
Question 414: Which of the following commands do you run on the AD server ...
Question 415: To run Gaia in 64bit mode, which of the following is true? 1...
Question 416: What is the officially accepted diagnostic tool for IP Appli...
Question 417: How does a cluster member take over the VIP after a failover...
Question 418: The challenges to IT involve deployment, security, managemen...
Question 419: Check Point recommends that you back up systems running Chec...
Question 420: After filtering a fw monitor trace by port and IP, a packet ...
Question 421: A Smart Provisioning Gateway could be a member of which VPN ...
Question 422: Which statement defines Public Key Infrastructure? Security ...
Question 423: What is the behavior of Cluster XL in a High Availability en...
Question 424: You have pushed a policy to your firewall and you are not ab...
Question 425: One profile in Smart Provisioning can update:...
Question 426: Central License management allows a Security Administrator t...
Question 427: Suppose the Security Gateway hard drive fails and you are fo...
Question 428: When synchronizing clusters, which of the following statemen...
Question 429: What happens if the identity of a user is known?...
Question 430: The connection to the Cluster XL member 'A' breaks. The Clus...
Question 431: By default, the Cluster Control Protocol (CCP) uses this to ...
Question 432: Which process should you debug if Smart Dashboard login fail...
Question 433: Your current VPN-1 NG with Application Intelligence (AI) R55...
Question 434: A customer is calling saying one member's status is Down. Wh...
Question 435: You need to publish GAiA routes using the OSPF routing proto...
Question 436: Which of the following actions is most likely to improve the...
Question 437: In Core XL, what process is responsible for processing incom...
Question 438: Where does the security administrator activate Identity Awar...
Question 439: Smart Provisioning uses different types of profiles to manag...
Question 440: Match the VPN-related terms with their definitions. Each cor...
Question 441: Which Check Point product implements a Consolidation Policy?...
Question 442: What are you required to do before running upgrade export?...
Question 443: Your R76 enterprise Security Management Server is running ab...
Question 444: Which process is responsible for kernel table information sh...
Question 445: VPN-1 NGX includes a resource mechanism for working with the...
Question 446: Jon is explaining how the inspection module works to a colle...
Question 447: You are running a R76 Security Gateway on Secure Platform. I...
Question 448: What could the following regular expression be used for in a...
Question 449: Which of the following does IPSec use during IPSec key negot...
Question 450: What is the supported Cluster XL configuration when configur...
Question 451: What is the command to enter the router shell?...
Question 452: What are the 3 main components of the Smart Event Software B...
Question 453: When connecting to the SSL VPN portal, you receive a pop-up ...
Question 454: When using Smart Dashboard to manage existing users in Smart...
Question 455: Which of the following commands shows full synchronization s...
Question 456: Where do you verify that Smart Directory is enabled?...
Question 457: Which of these components does NOT require a VPN-1 NGX R65 l...
Question 458: Assume you are a Security Administrator for ABCTech. You hav...
Question 459: How should Check Point packages be uninstalled?...
Question 460: VPN routing can also be configured by editing which file?...
Question 461: Review the rules. Assume domain UDP is enabled in the impled...
Question 462: You are reviewing Smart View Tracker entries, and see a Conn...
Question 463: How does Check Point recommend that you secure the sync inte...
Question 464: SIMULATION Complete this statement. To save interface inform...
Question 465: Which of the following items should be configured for the Se...
Question 466: Network applications accessed using SSL Network Extender hav...
Question 467: How do you enable Secure XL (command line) on GAiA?...
Question 468: Your company's Security Policy forces users to authenticate ...
Question 469: Your current VPN-1 NG with Application Intelligence (Al) R55...
Question 470: After you add new interfaces to a cluster, how can you check...
Question 471: You are the Mega Corp Security Administrator. This company u...
Question 472: Math the Smart Dashboard session status icons with the appro...
Question 473: SIMULATION The command useful for debugging by capturing pac...
Question 474: Review the Rule Base displayed. (Exhibit) For which rules wi...
Question 475: While authorization for users managed by Smart Directory is ...
Question 476: Because of pre-existing design constraints, you set up manua...
Question 477: What is not available for Express Reports compared to Standa...
Question 478: Which of the listed load-balancing methods is NOT valid?...
Question 479: Which changes are tracked by Smart Workflow?...
Question 480: Which of the following components contains the Events Data B...
Question 481: What is the lowest possible version a Security Gateway may b...
Question 482: SIMULATION Fill in the blank. To remove site-to-site IKE and...
Question 483: The Management Portal allows all of the following EXCEPT:...
Question 484: If your firewall is performing a lot of IPS inspection and t...
Question 485: David wants to manage hundreds of gateways using a central m...
Question 486: If Cluster XL Load Sharing is enabled with state synchroniza...
Question 487: You are trying to configure Directional VPN Rule Match in th...
Question 488: Steve tries to configure Directional VPN Rule Match in the R...
Question 489: To force clients to use Integrity Secure Workspace when acce...
Question 490: What is the Smart Event Analyzer's function?...
Question 491: What is the Smart Event Client's function?...
Question 492: How many pre-defined exclusions are included by default in S...
Question 493: Your users are defined in a Windows 2008 Active Directory se...
Question 494: With the User Directory Software Blade, you can create R76 u...
Question 495: How can you view the virtual cluster interfaces of a Cluster...
Question 496: Where can you find the Check Point's SNMP MIB file?...
Question 497: When does the Smart Workflow Policy Installation window appe...
Question 498: Using the output below, why is the QoS rule not limiting the...
Question 499: The process ________ is responsible for GUI Client communica...
Question 500: The customer wishes to install a cluster. In his network, th...
Question 501: What is the command to upgrade an NG with Application Intell...
Question 502: Assume an intruder has compromised your current IKE Phase 1 ...
Question 503: Your organization's disaster recovery plan needs an update t...
Question 504: Which encryption scheme provides in-place encryption?...
Question 505: In Company XYZ, the DLP Administrator defined a new Keywords...
Question 506: What does it mean when a Security Gateway is labeled Untrust...
Question 507: Which procedure creates a new administrator in Smart Workflo...
Question 508: There are several Smart Directory (LDAP) features that can b...
Question 509: If traffic requires preferential treatment by other routers ...
Question 510: In R71, how would you define a rule to block all traffic sen...
Question 511: How do you recover communications between your Security Mana...
Question 512: How can you completely tear down a specific VPN tunnel in an...
Question 513: You want VPN traffic to match packets from internal interfac...
Question 514: What Smart Console application allows you to change the Log ...
Question 515: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 516: What is the most common cause for a Quick mode packet 1 fail...
Question 517: Yoav is a Security Administrator preparing to implement a VP...
Question 518: Which of the following statements accurately describes the u...
Question 519: In New Mode HA, the internal cluster IP VIP address is 10.4....
Question 520: You have two IP Appliances: one IP565 and one IP395. Both ap...
Question 521: SIMULATION Fill in the blank. The command that typically gen...
Question 522: Your network is experiencing connectivity problems and you w...
Question 523: Select the command set best used to verify proper failover f...
Question 524: SIMULATION Fill in the blanks. To view the number of concurr...
Question 525: How can you view the critical devices on a cluster member in...
Question 526: During a Security Management Server migrate export, the syst...
Question 527: In Load Sharing Unicast mode, the internal cluster IP addres...
Question 528: What command syntax would you use to turn on PDP logging in ...
Question 529: Your current stands alone VPN-1 NG with Application Intellig...
Question 530: Which of the following commands would you run to remove site...
Question 531: Which Check Point QoS feature marks the ToS byte in the IP h...
Question 532: You have an internal FTP server, and you allow downloading, ...
Question 533: Which is NOT a method through which Identity Awareness recei...
Question 534: You need to back up the routing, interface, and DNS configur...
Question 535: The ________ Check Point Cluster XL mode must synchronize th...
Question 536: SIMULATION Type the full fw command and syntax that allows y...
Question 537: You configure a Check Point QoS Rule Base with two rules: an...
Question 538: What is the default port number for standard TCP connections...
Question 539: What is the primary benefit of using upgrade export over eit...
Question 540: You are concerned that the processor for your firewall runni...
Question 541: When an Endpoint user is able to authenticate but receives a...
Question 542: What is Check Point's Core XL?
Question 543: Which of the following is NOT a restriction for connection t...
Question 544: What step should you take before running migrate_export?...
Question 545: In a particular IPS protection in R76 in the Logging Setting...
Question 546: You are responsible for the IPS configuration of your Check ...
Question 547: Complete this statement from the options provided. Using Cap...
Question 548: When restoring a Security Management Server from a backup fi...
Question 549: ______________ is NOT an Smart Event event-triggered Automat...
Question 550: What is the purpose of the pre-defined exclusions included w...
Question 551: You have a High Availability Cluster XL configuration. Machi...
Question 552: Which of the following statements about the Port Scanning fe...
Question 553: You plan to incorporate OPSEC servers, such as Web sense and...
Question 554: Which of the following commands can provide the most complet...
Question 555: In the following command, LSMcli [-d] &lt;server&gt;&lt;user...
Question 556: The User Directory Software Blade is used to integrate which...
Question 557: How could you compare the Fingerprint shown to the Fingerpri...
Question 558: Which of the following CLISH commands would you use to set t...
Question 559: Which statement about LDAP and Active Directory (AD) with SS...
Question 560: For a dedicated DLP Gateway that runs in inline bridge mode,...
Question 561: What tools CANNOT be launched from Smart Update NGX R65?...
Question 562: Public-key cryptography is considered which of the following...
Question 563: The User Directory Software Blade is used to integrate which...
Question 564: Your primary Security Management Server runs on GAiA. What i...
Question 565: To help organize events, Smart Reporter uses filtered querie...
Question 566: You are preparing computers for a new Cluster XL deployment....
Question 567: Which is NOT a valid option when upgrading Cluster Deploymen...
Question 568: SIMULATION Fill in the blank. To save your OSPF configuratio...
Question 569: SIMULATION In a zero downtime scenario, which command do you...
Question 570: You are a Security Administrator who has installed Security ...
Question 571: A Fast Path Upgrade of a cluster:...
Question 572: Which of the following services will cause Secure XL templat...
Question 573: When configuring a Permanent Tunnel between two gateways in ...
Question 574: Which port is typically used by SSL Network Extender, if the...
Question 575: You have a production implementation of Management High Avai...
Question 576: David is the Multi Corp Security Manager and approves the pr...
Question 577: Based on the following information, which of the statements ...
Question 578: What happens if the identity of a user is known?...
Question 579: Which of the following is NOT a Cluster XL mode?...
Question 580: What is a requirement for setting up Management High Availab...
Question 581: The process _______ executes the authentication for logging ...
Question 582: The process that performs the authentication for Remote Acce...
Question 583: Which statements about Management HA are correct? 1) Primary...
Question 584: Which protocol is not supported for DLP?...
Question 585: A tracked Smart Event Candidate in a Candidate Pool becomes ...
Question 586: Which three of the following components are required to ge a...
Question 587: How granular may an administrator filter an Access Role with...
Question 588: A customer calls saying that a Load Sharing cluster shows dr...
Question 589: Which describes the function of the account unit?...
Question 590: Mega Corp is using Smart Center Server with several gateways...
Question 591: Where is the ideal place to deploy your SSL VPN?...
Question 592: Which of the following deployment scenarios CANNOT be manage...
Question 593: Security Gateway R76 supports User Authentication for which ...
Question 594: Damon enables an SMTP resource for content protection. He no...
Question 595: You are the Security Administrator for Mega Corp. A Check Po...
Question 596: To verify Secure XL statistics you would use the command ___...
Question 597: You have configured an LDAP account unit and confirmed the A...
Question 598: In the following cluster configuration; if you reboot sglond...
Question 599: The Smart Provisioning management concept is based on:...
Question 600: Where do Gateways managed by Smart Provisioning fetch their ...
Question 601: In Cluster XL, _______ is defined by default as a critical d...
Question 602: Which Check Point product is used to create and save changes...
Question 603: Which of the following files is used to allow only specific ...
Question 604: Which of the following can NOT approve a change in a Smart W...
Question 605: Can you upgrade R71 directly to R76?...
Question 606: Typically, when you upgrade the Security Management Server, ...
Question 607: Which is the BEST configuration option to protect internal u...
Question 608: What is the behavior of Cluster XL in a High Availability en...
Question 609: Which of the following is NOT defined by an Access Role obje...
Question 610: Which three of the following components are required to get ...
Question 611: Which load-balancing method below is NOT valid?...
Question 612: In a Windows environment, Smart Reporter Data Base settings ...
Question 613: When Converting Gateways to Smart LSM Security Gateways, you...
Question 614: How can you prevent delay-sensitive applications, such as vi...
Question 615: Using Smart Provisioning Profiles, which of the following co...
Question 616: After installing VPN-1 Pro NGQ R65, you discover that one po...
Question 617: Which of the following is NOT part of the policy installatio...
Question 618: Which of the following TCP port numbers is used to connect t...
Question 619: You want to upgrade an NG with Application Intelligence R55 ...
Question 620: Which of the following methods will provide the most complet...
Question 621: You have configured Automatic Static NAT on an internal host...
Question 622: When a security administrator logs in to Smart Dashboard and...
Question 623: What is Check Point's Secure XL?...
Question 624: What is the primary benefit of using upgrade export over eit...
Question 625: Wayne configures an HTTP Security Server to work with the co...
Question 626: What is the advantage for deploying SSL VPN in a DMZ, versus...
Question 627: The process ________ is responsible for Management High Avai...
Question 628: What can be said about RSA algorithms? Select all that apply...
Question 629: You want to verify that your Check Point cluster is working ...
Question 630: Which of the following methods will provide the most complet...
Question 631: You are running the license upgrade tool on your Secure Plat...
Question 632: Your network traffic requires preferential treatment by othe...
Question 633: Which of the following is NOT a Smart Event Permission Profi...
Question 634: Which command would you use to save the IP address and routi...
Question 635: When using Connecter with Endpoint Security Policies, what o...
Question 636: Which type of service should a Security Administrator use in...
Question 637: The process ________________ compiles $FWDIR/conf/*.W files ...
Question 638: Mega Corps' disaster recovery plan is past due for an update...
Question 639: For proper system operation, the Administrator has to config...
Question 640: Which of the following items can be provisioned via a Profil...
Question 641: What Smart Console application allows you to change the Smar...
Question 642: To configure a Security Management Server for an SSL VPN Gat...
Question 643: Which of the following provides a unique user ID for a digit...
Question 644: For an initial installation of Connecter, which of the follo...
Question 645: What could be a reason why synchronization between primary a...
Question 646: The following diagram illustrates how a VPN-1 Secure Client ...
Question 647: Laura notices the Microsoft Visual Basic Bits Protection is ...
Question 648: What is the router command to save your OSPF configuration?...
Question 649: When distributing IPSec packets to gateways in a Load Sharin...
Question 650: What is the correct policy installation process order? 1. Ve...
Question 651: When troubleshooting user authentication, you may see the fo...
Question 652: How would you configure a rule in a Security Policy to allow...
Question 653: When using Smart Workflow, how many sessions can be in progr...
Question 654: Your customer wishes to use Smart Workflow Software Blade, b...
Question 655: SIMULATION Fill in the blank with a numeric value. The defau...
Question 656: Greg is creating rules and objects to control VoIP traffic i...
Question 657: Choose all correct statements. Smart Update, located on a VP...
Question 658: Which statement is TRUE for route-based VPNs?...
Question 659: Frank is concerned with performance and wants to configure t...
Question 660: Your customer asks you about the Performance Pack. You expla...
Question 661: What command syntax would you use to see accounts the gatewa...
Question 662: Which Name Resolution protocols are supported in SSL VPN?...
Question 663: Which Check Point QoS feature is used to dynamically allocat...
Question 664: In Smart Workflow, what is NOT a valid possibility?...
Question 665: What is a task of the Smart Event Client?...
Question 666: How is change approved for implementation in Smart Workflow?...
Question 667: Which internal user authentication protocols are supported i...
Question 668: How frequently does CPSIZEME run by default?...
Question 669: Which of the following are authentication methods that Secur...
Question 670: You find that Users are not prompted for authentication when...
Question 671: Captive Portal is a __________ that allows the gateway to re...
Question 672: When upgrading to NGX R65, which Check Point products do not...
Question 673: The ______________ contains the Events Data Base....
Question 674: Which of the following statements is TRUE concerning MEP VPN...
Question 675: If using AD Query for seamless identity data reception from ...
Question 676: Which command will erase all CRL's?...
Question 677: You can NOT use Smart Dashboard's Smart Directory features t...
Question 678: From the following output of cphaprob state, which Cluster X...
Question 679: Which of the following authentication methods can be configu...
Question 680: Where do you define NAT properties so that NAT is performed ...
Question 681: Which component receives events and assigns severity levels ...
Question 682: You need to verify the effectiveness of your IPS configurati...
Question 683: Public keys and digital certificates provide which of the fo...
Question 684: In a Management High Availability (HA) configuration, you ca...
Question 685: If a digital signature is used to achieve both data-integrit...
Question 686: When using Captive Portal to send unidentified users to a We...
Question 687: When configuring an LDAP Group object, which option should y...
Question 688: Your primary Security Management Server runs on GAiA. What i...
Question 689: Which external user authentication protocols are supported i...
Question 690: Your main internal network 10.10.10.0/24 allows all traffic ...
Question 691: Which Check Point address translation method allows an admin...
Question 692: What physical machine must have access to the User Center pu...
Question 693: Review the cphaprob state command output from one New Mode H...
Question 694: SIMULATION To bind a NIC to a single processor when using Co...
Question 695: For best performance in Event Correlation, you should use:...
Question 696: Snapshot is available on which Security Management Server an...
Question 697: When configuring numbered VPN Tunnel Interfaces (VTIs) in a ...
Question 698: Which operating system(s) support(s) unnumbered VPN Tunnel I...
Question 699: Which command will only show the number of entries in the co...
Question 700: How can you check whether IP forwarding is enabled on an IP ...
Question 701: Your network includes Cluster XL running Multicast mode on t...
Question 702: Your internal network is configured to be 10.1.1.0/24. This ...
Question 703: Even after configuring central logging on Connecter, Connect...
Question 704: Which of the following is an example of the hash function?...
Question 705: Before upgrading Secure Platform, you should create a backup...
Question 706: How do you check the version of "CPSIZEME" on GAiA?...
Question 707: You are troubleshooting a HTTP connection problem. You've st...
Question 708: You are reviewing computer information collected in Client I...
Question 709: Where can a Security Administrator adjust the unit of measur...
Question 710: SIMULATION Fill in the blank. To verify Secure XL statistics...
Question 711: Which is the lowest Gateway version manageable by Smart Cent...
Question 712: When do modifications to the Event Policy take effect?...
Question 713: Which of the following platforms does NOT support Secure XL?...
Question 714: There are times when you want to use Link Selection to manag...
Question 715: Users with Identity Awareness Agent installed on their machi...
Question 716: What is a "sticky" connection?
Question 717: A VPN Tunnel Interface (VTI) is defined on Secure Platform P...
Question 718: Your customer wishes to install Smart Workflow on top of R70...
Question 719: Your company is running Security Management Server R76 on GA...
Question 720: What is NOT a valid LDAP use in Check Point Smart Directory?...
Question 721: Several Security Policies can be used for different installa...
Question 722: SIMULATION In a zero downtime firewall cluster environment, ...
Question 723: Which of the following are supported with the office mode? S...
Question 724: In Smart Dashboard, Translate destination on client side is ...
Question 725: Your R7x-series Enterprise Security Management Server is run...
Question 726: State Synchronization is enabled on both members in a cluste...
Question 727: Where is it necessary to configure historical records in Sma...
Question 728: The following graphic illustrates which command being issued...
Question 729: The process_________executes the authentication for Remote A...
Question 730: Your customer complains of the weak performance of his syste...
Question 731: In Cluster XL R76; when configuring a cluster synchronizatio...
Question 732: When using Secure Platform, it might be necessary to tempora...
Question 733: Using the output below, what does the red flag indicate for ...
Question 734: As a Security Administrator, you must refresh the Client Aut...
Question 735: When Load Sharing Multicast mode is defined in a Cluster XL ...
Question 736: What action can be run from Smart Update NGX R65?...
Question 737: In which Cluster XL Load Sharing mode, does the pivot machin...
Question 738: Your company has two headquarters, one in London, one in New...
Question 739: Which of the following is TRUE concerning numbered VPN Tunne...
Question 740: The Totally Cool Security Company has a large security staff...
Question 741: To qualify as an Identity Awareness enabled rule, which colu...
Question 742: To configure a client to properly log in to the user portal ...
Question 743: When defining an Organizational Unit, which of the following...
Question 744: Which command allows you to view the contents of an R76 tabl...
Question 745: You use the snapshot feature to store your Connecter SSL VPN...
Question 746: What is the proper command for importing users into the R77 ...
Question 747: The Core XL SND (Secure Network Distributor) is responsible ...
Question 748: What process is responsible for transferring the policy file...
Question 749: Which of the following commands will stop acceleration on a ...
Question 750: You have just upgraded your Load Sharing gateway cluster (bo...
Question 751: SIMULATION Fill in the blank. The user wants to replace a fa...
Question 752: Consider the following actions that VPN-1 NGX can take when ...
Question 753: Concerning these products: Secure Platform, VPN-1 Pro Gatewa...
Question 754: You are running R71 and using the new IPS Software Blade. To...
Question 755: When running DLP Wizard for the first time, which of the fol...
Question 756: Review the R76 configuration. (Exhibit) Is it correct for Ma...
Question 757: Assuming all connections that are allocated bandwidth in you...
Question 758: What is the significance of the depicted icon in the Smart W...
Question 759: Which of the following is part of the PKI? Select all that a...
Question 760: Which of the following operating systems support numbered VT...
Question 761: When configuring site-to-site VPN High Availability (HA) wit...
Question 762: Which file defines the fields for each object used in the fi...
Question 763: Steve is troubleshooting a connection problem with an intern...
Question 764: Match the Best Management High Availability synchronization-...
Question 765: What is the command to upgrade a Secure Platform NG with App...
Question 766: Identify the correct step performed by Smart Update to upgra...
Question 767: Stephanie wants to reduce the encryption overhead and improv...
Question 768: How do you verify a VPN Tunnel Interface (VTI) is configured...
Question 769: Which operating system is NOT supported by VPN-1 Secure Clie...
Question 770: You are using trace logger to debug SSL VPN's server side an...
Question 771: You have pushed a policy to your firewall and you are not ab...
Question 772: Please review the following QoS policy: (Exhibit) Assume you...
Question 773: A Full Connectivity Upgrade of a cluster:...
Question 774: How do you configure the Security Policy to provide user acc...
Question 775: John Adams is an HR partner in the ACME organization. ACME I...
Question 776: Your R76 primary Security Management Server is installed on ...
Question 777: In cryptography, the Rivest, Shamir, Adelman (RSA) scheme ha...
Question 778: What is a task of the Smart Event Server?...
Question 779: Which of the following is NOT supported by Core XL?...
Question 780: You start the configuration of Smart Workflow. Smart Workflo...
Question 781: When you check Web Server in a host-node object, what happen...
Question 782: A user cannot authenticate to SSL VPN. You have verified the...
Question 783: The third-shift Administrator was updating Security Manageme...
Question 784: When a packet is flowing through the security gateway, which...
Question 785: SIMULATION Multi Corp is located in Atlanta. It has a branch...
Question 786: The Smart Event Correlation Unit:...
Question 787: You are configuring the VoIP Domain object for a Skinny Clie...
Question 788: _____________ generates a Smart Event Report from its SQL da...
Question 789: You are a SSL VPN administrator. Your users complain that th...
Question 790: Which of the following functions CANNOT be performed in Clie...
Question 791: VPN access control would fall under which VPN component?...
Question 792: What are you required to do before running the command upgra...
Question 793: SIMULATION Type the full cphaprob command and syntax that wi...
Question 794: What is a requirement for setting up R77 Management High Ava...
Question 795: What port is used for communication to the User Center with ...
Question 796: All R76 Security Servers can perform authentication with the...
Question 797: Mark the configuration options that are available for Data L...
Question 798: Your organization maintains several IKE VPN's. Executives in...
Question 799: Which component functions as the Internal Certificate Author...
Question 800: What firewall kernel table stores information about port all...
Question 801: Your VPN Community includes three Security Gateways. Each Ga...
Question 802: The process that performs the authentication for Smart Dashb...
Question 803: What cluster mode is represented in this case? (Exhibit)...
Question 804: You want to establish a VPN, using certificates. Your VPN wi...
Question 805: SIMULATION Fill in the blank. To verify the Secure XL status...
Question 806: Mega Corp is running Smart center R70, some Gateways at R65 ...
Question 807: How does Cluster XL Unicast mode handle new traffic?...
Question 808: The following rule contains an FTP resource object in the Se...
Question 809: With the User Directory Software Blade, you can create R77 u...
Question 810: What is the syntax for uninstalling a package using newpkg?...
Question 811: Remote clients are using IPSec VPN to authenticate via LDAP ...
Question 812: What is a possible reason for the grayed out Restore Version...