<< Prev Question Next Question >>

Question 798/812

Your organization maintains several IKE VPN's. Executives in your organization want to know which mechanism Security Gateway R76 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (812q)
Question 1: Which of the following are valid PKI architectures?...
Question 2: In Cluster XL, which of the following processes are defined ...
Question 3: What mechanism does a gateway configured with Identity Aware...
Question 4: Using IPS, how do you notify the Security Administrator that...
Question 5: Which two processes are responsible on handling Identity Awa...
Question 6: Which of the following statements about SSL VPN is TRUE?...
Question 7: What are the Smart Provisioning Policy Status indicators?...
Question 8: Smart Provisioning can provision the Operating System and ne...
Question 9: Many companies have defined more than one administrator. To ...
Question 10: To change the default port of the Management Portal:...
Question 11: You logged in to your firewall and discovered that the sched...
Question 12: You want to upgrade a cluster with two members to VPN-1 NGX....
Question 13: After Travis added new processing cores on his server, Core ...
Question 14: Why should the upgrade export configuration file (.tgz) be d...
Question 15: You set up a mesh VPN Community, so your internal networks c...
Question 16: What is the proper command for importing users into the R76 ...
Question 17: How do you control the maximum mail messages in a spool dire...
Question 18: With is the Smart Event Correlation Unit's function?...
Question 19: To clean the system of all events, you should delete the fil...
Question 20: John Adams is an HR partner in the ACME organization. ACME I...
Question 21: In Management High Availability, what is an Active SMS?...
Question 22: SSL termination takes place:
Question 23: The process ___________ is responsible for all other securit...
Question 24: How is the Smart Workflow Session Information Pane enabled?...
Question 25: What step should you take before running upgrade export?...
Question 26: Which of the following is a valid Active Directory designati...
Question 27: Looking at the SYN packets in the Wire shark output, select ...
Question 28: What is the command to show OSPF adjacencies?...
Question 29: While using the Smart Provisioning Wizard to create a new pr...
Question 30: You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NG...
Question 31: In Cluster XL, which of the following are defined by default...
Question 32: Problems sometimes occur when distributing IPSec packets to ...
Question 33: What is the most typical type of configuration for VPNs with...
Question 34: You are running a VPN-1 NG with Application Intelligence R54...
Question 35: Can the smallest appliance handle all Blades simultaneously?...
Question 36: The process ________ is responsible for Policy compilation....
Question 37: You are Mega Corp's Security Administrator. There are variou...
Question 38: Which of the following can NOT be modified by editing the cp...
Question 39: You configure a Check Point QoS Rule Base with two rules: an...
Question 40: The file snapshot generates is very large, and can only be r...
Question 41: How can you disable Secure XL via the command line (it does ...
Question 42: SIMULATION Type the command and syntax to configure the Clus...
Question 43: Which of the following statements accurately describes the m...
Question 44: The Smart Event Correlation Unit:...
Question 45: There are times when you want to use Link Selection to manag...
Question 46: If a Smart Update upgrade or distribution operation fails on...
Question 47: The Smart Event Server:
Question 48: Refer to the network topology below. (Exhibit) You have IPS ...
Question 49: An organization may be distributed across several Smart Dire...
Question 50: SIMULATION Fill in the blank. You can set Acceleration to ON...
Question 51: Which of these four Check Point QoS technologies prevents th...
Question 52: Can you implement a complete IPv6 deployment without IPv4 ad...
Question 53: Which of the following is the preferred method for adding st...
Question 54: You plan to migrate a VPN-1 NG with Application Intelligence...
Question 55: To backup all events stored in the Smart Event Server, you s...
Question 56: You have selected the event Port Scan from Internal Network ...
Question 57: When a failed cluster member recovers, which of the followin...
Question 58: The Smart Event Server:
Question 59: Which answers are TRUE? Automatic Static NAT CANNOT be used ...
Question 60: A snapshot delivers a complete backup of GAiA. How do you re...
Question 61: If Bob wanted to create a Management High Availability confi...
Question 62: There are times when you want to use Link Selection to manag...
Question 63: Restoring a snapshot-created file on one machine that was cr...
Question 64: Which technology would describe RDED for Qos?...
Question 65: Jennifer McHanry is CEO of ACME. She recently bought her own...
Question 66: If the number of kernel instances for Core XL shown is 6, ho...
Question 67: You are preparing computers for a new Cluster XL deployment....
Question 68: You are responsible for the configuration of Mega Corp's Che...
Question 69: Match the Cluster XL modes with their configurations. Exhibi...
Question 70: Which CLI tool helps on verifying proper Cluster XL sync?...
Question 71: Which component functions as the Internal Certificate Author...
Question 72: Which of the following statements is TRUE concerning MEP VPN...
Question 73: Which process should you debug if Smart Dashboard login fail...
Question 74: Your company is planning on moving their server farm to a ne...
Question 75: Which operating systems are supported by a Check Point Secur...
Question 76: Multi Corp is located in Atlanta. It has a branch office in ...
Question 77: When two or more DLP rules are matched, the action taken is ...
Question 78: Which VPN Community object is used to configure VPN routing ...
Question 79: Which of the following is NOT TRUE regarding HTTPS traffic b...
Question 80: What action CANNOT be run from Smart Update NGX R65?...
Question 81: Refer to Exhibit below: (Exhibit) Match the Cluster XL modes...
Question 82: Check Point Clustering protocol, works on:...
Question 83: Control connections between the Security Management Server a...
Question 84: You have created a Rule Base for firewall, websydney. Now yo...
Question 85: All of the following are used by the DLP engine to match a m...
Question 86: For Management High Availability synchronization, what does ...
Question 87: What type of object may be explicitly defined as a MEP VPN?...
Question 88: Barak is a Security Administrator for an organization that h...
Question 89: Which of the following is NOT a supported browser for Manage...
Question 90: When configuring a Web Application for SSL VPN remote access...
Question 91: You want only RAS signals to pass through H.323 Gatekeeper a...
Question 92: Which of the following commands can be used to stop Manageme...
Question 93: When synchronizing clusters, which of the following statemen...
Question 94: In a "zero downtime" scenario, which command do you run manu...
Question 95: Which of the following is NOT a LDAP server option in Smart ...
Question 96: __________ is NOT a Cluster XL mode....
Question 97: Which of the following uses the same key to decrypt as it do...
Question 98: Check Point support has asked Tony for a firewall capture of...
Question 99: From the following output of cphaprob state, (Exhibit) which...
Question 100: When selecting a backup target using Smart Provisioning, whi...
Question 101: Smart Provisioning is an integral part of the Security Manag...
Question 102: You have three servers located in a DMZ, using private IP ad...
Question 103: You have to uninstall the Check Point Smart Workflow Softwar...
Question 104: How is Smart Workflow disabled?...
Question 105: To back up all events stored in the Smart Event Server, you ...
Question 106: By default, what happens to the existing connections on a fi...
Question 107: Which of the following is TRUE concerning numbered VPN Tunne...
Question 108: Which statement is TRUE for route-based VPN's?...
Question 109: In Company XYZ, the DLP Administrator defined a new template...
Question 110: Exhibit: (Exhibit) UserA is able to create a Smart LSM Secur...
Question 111: Which command would you use to save the interface informatio...
Question 112: The process _______ provides service to access the GAIA conf...
Question 113: When upgrading a cluster in Full Connectivity Mode, the firs...
Question 114: What is the Smart Event Correlation Unit's function?...
Question 115: If no flags are defined during a back up on the Security Man...
Question 116: Susan needs to change the DNS settings on her Secure Platfor...
Question 117: How are cached usernames and passwords cleared from the memo...
Question 118: Given the following protection detailed and the enforcing ga...
Question 119: What is the reason for the following error? (Exhibit)...
Question 120: SIMULATION To stop acceleration on a GAiA Security Gateway, ...
Question 121: Your online bookstore has customers connecting to a variety ...
Question 122: Review the following list of actions that Security Gateway R...
Question 123: Which of the following does NOT happen when using Pivot Mode...
Question 124: When migrating the Smart Event data base from one server to ...
Question 125: What is the bit size of DES?
Question 126: Which Security Servers can perform Content Security tasks, b...
Question 127: SIMULATION Fill in the blanks. To view the number of concurr...
Question 128: How would you set the debug buffer size to 1024?...
Question 129: Which utility or command is useful for debugging by capturin...
Question 130: Which of the following is a CLI command for Security Gateway...
Question 131: If both domain-based and route-based VPN's are configured, w...
Question 132: Organizations are sometimes faced with the need to locate cl...
Question 133: Which of the following statements is FALSE regarding OSPF co...
Question 134: Review the cphaprob state command output from a New Mode Hig...
Question 135: Which of the following is NOT an advantage of Smart Log?...
Question 136: Which of the following commands can be used to troubleshoot ...
Question 137: You just installed a new Web server in the DMZ that must be ...
Question 138: A customer called to report one cluster member's status as D...
Question 139: SIMULATION Fill in the blank. In New Mode HA, the internal c...
Question 140: Your expanding network currently includes Cluster XL running...
Question 141: When using a template to define a Smart Directory, where sho...
Question 142: Which of the following is a supported Sticky Decision Functi...
Question 143: The following graphic illustrates which command being issued...
Question 144: What port is used for Administrator access for your SSL VPN?...
Question 145: Included in the customer's network are some firewall systems...
Question 146: You need to determine if your company's Web servers are acce...
Question 147: Your customer wishes to install the Smart Workflow Software ...
Question 148: If you need strong protection for the encryption of user dat...
Question 149: Which network port does PPTP use for communication?...
Question 150: Your company has the requirement that Smart Event reports sh...
Question 151: Which of the following generates a Smart Event Report from i...
Question 152: Use the table to match the BEST Management High Availability...
Question 153: Which of the following statements is FALSE about the DLP Sof...
Question 154: Which process is responsible for full synchronization in Clu...
Question 155: Paul has just joined the Mega Corp security administration t...
Question 156: Can end users be forced to authenticate by using client cert...
Question 157: Select the correct statement about Secure Internal Communica...
Question 158: What happens in relation to the CRL cache after a cpstop;sps...
Question 159: John is upgrading a cluster from NGX R65 to R76. John knows ...
Question 160: Multi Corp is running Smart center R71 on an IPSO platform a...
Question 161: Included in the client's network are some switches, which re...
Question 162: You configure a Check Point QoS Rule Base with two rules: an...
Question 163: When you add a resource service to a rule, which ONE of the ...
Question 164: What cluster mode is represented in this case? (Exhibit)...
Question 165: Which of the following software blades can be used to provid...
Question 166: While authorization for users managed by Smart Directory is ...
Question 167: How many events are shown by default in the Event preview pa...
Question 168: What is the purpose of the pre-defined exclusions included w...
Question 169: Peter is your new Security Administrator. On his first worki...
Question 170: Where is the encryption domain for a Smart LSM Security Gate...
Question 171: Anytime a client initiates a connection to a server, the fir...
Question 172: You plan to install a VPN-1 Pro Gateway for VPN-1 NGX at you...
Question 173: A Minimal Effort Upgrade of a cluster:...
Question 174: In a Cluster, some features such as VPN only function proper...
Question 175: What is used to validate a digital certificate?...
Question 176: When synchronizing clusters, which of the following statemen...
Question 177: Your primary Smart Center Server is installed on a Secure Pl...
Question 178: Which method of load balancing describes "Round Robin"?...
Question 179: The London office just upgraded their DNS servers so their G...
Question 180: Check Point recommends that you back up systems running Chec...
Question 181: In an R76 Cluster, some features such as VPN only function p...
Question 182: Which of the following can NOT be done on the Management Por...
Question 183: By default, a standby Security Management Server is automati...
Question 184: You run cphaprob -a if. When you review the output, you find...
Question 185: What is a task of the Smart Event Correlation Unit?...
Question 186: You are using Smart Update to fetch data and perform a remot...
Question 187: What happens when an Administrator activates the DLP Portal ...
Question 188: The process that performs the authentication for SSL VPN Use...
Question 189: When migrating the Smart Event data base from one server to ...
Question 190: Which method of load balancing describes "Round Robin"?...
Question 191: You are preparing to configure your VoIP Domain Gatekeeper o...
Question 192: Remote clients are using SSL VPN to authenticate via LDAP se...
Question 193: SIMULATION Type the command and syntax to view critical devi...
Question 194: True or false? After creating a snapshot of a Windows 2003 S...
Question 195: _________ is the called process that starts when opening Sma...
Question 196: Which command provides cluster upgrade status?...
Question 197: For Management High Availability, if an Active SMS goes down...
Question 198: You are establishing a Cluster XL environment, with the foll...
Question 199: John is configuring a new R76 Gateway cluster but he can not...
Question 200: In a R76 Management High Availability (HA) configuration, yo...
Question 201: John is the Multi Corp Security Administrator. If he suggest...
Question 202: Refer to the to the network topology below. (Exhibit) You ha...
Question 203: Which Remote Desktop protocols are supported natively in SSL...
Question 204: Typically, when you upgrade the Security Management Server, ...
Question 205: After implementing Static Address Translation to allow Inter...
Question 206: Management Portal should be installed on: (i) Management Ser...
Question 207: Which technology is responsible for assembling packet stream...
Question 208: Access Role objects define users, machines, and network loca...
Question 209: How many pre-defined exclusions are included by default in S...
Question 210: _______________ manages Standard Reports and allows the admi...
Question 211: The connection to the first Cluster XL member breaks. The fi...
Question 212: You have selected the event Port Scan from Internal Network ...
Question 213: VPN traffic control would fall under which VPN component?...
Question 214: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 215: Typically, when you upgrade the Security Management Server, ...
Question 216: In a R76 Cluster XL Load Sharing configuration, which type o...
Question 217: A Web server behind the Security Gateway is set to Automatic...
Question 218: SIMULATION To provide cluster upgrade status, use command...
Question 219: Your expanding network currently includes Cluster XL running...
Question 220: SIMULATION Fill in the blank. In New Mode HA, the internal c...
Question 221: Robert has configured a Common Internet File System (CIFS) r...
Question 222: You receive an alert indicating a suspicious FTP connection ...
Question 223: What is the offline CPSIZEME upload procedure?...
Question 224: Does Check Point recommend generating an upgrade export on s...
Question 225: What is NOT true about Management Portal?...
Question 226: When deploying a dedicated DLP Gateway behind a perimeter fi...
Question 227: A snapshot delivers a complete backup of Secure Platform. Th...
Question 228: How do you verify the Check Point kernel running on a firewa...
Question 229: A user attempts to initialize a network application using SS...
Question 230: How do you block some seldom-used FTP commands, such as CWD,...
Question 231: Which Security Gateway R76 configuration setting forces the ...
Question 232: Which of the following is a valid Active Directory designati...
Question 233: The Smart Event Client:
Question 234: What type of traffic can be re-directed to the Captive Porta...
Question 235: Which of the following log files contains verbose informatio...
Question 236: What is the default port number for Secure Sockets Layer con...
Question 237: If you check the box "Use Aggressive Mode", in the IKE Prope...
Question 238: In a zero downtime firewall cluster environment what command...
Question 239: A Zero Downtime Upgrade of a cluster:...
Question 240: How can you verify that Secure XL is running?...
Question 241: What is the Smart Event Analyzer's function?...
Question 242: In Smart Directory, what is each LDAP server called?...
Question 243: John is the Mega Corp Security Administrator, and is using C...
Question 244: Which of the following is NOT accelerated by Secure XL?...
Question 245: You are a Security Administrator preparing to deploy a new H...
Question 246: You want to upgrade a cluster with two members to R76. The S...
Question 247: What are the Smart Provisioning Provisioning Profile indicat...
Question 248: For object-based VPN routing to succeed, what must be config...
Question 249: Why would an old Connecter Gateway IP be displayed to remote...
Question 250: When configuring an LDAP Group object, which option should y...
Question 251: Which of the following statements is TRUE concerning MEP VPN...
Question 252: Which of the following manages Standard Reports and allows t...
Question 253: Which of the following load-balancing methods is not valid?...
Question 254: Identify the correct step performed by Smart Update to upgra...
Question 255: SIMULATION Fill in the blank. To verify that a VPN Tunnel is...
Question 256: An Account Unit is the interface between the __________ and ...
Question 257: SIMULATION Fill in the blank. What is the correct command an...
Question 258: Which OPSEC server is used to prevent users from accessing c...
Question 259: What command will stop all (and only) Management Portal serv...
Question 260: Where multiple Smart Directory servers exist in an organizat...
Question 261: Which command line interface utility allows the administrato...
Question 262: At what router prompt would you save your OSPF configuration...
Question 263: You want to implement Static Destination NAT in order to pro...
Question 264: There are times when you want to use Link Selection to manag...
Question 265: An administrator has installed the latest HFA on the system ...
Question 266: Smart Reporter reports can be used to analyze data from a pe...
Question 267: Your customer asks you about Check Point Smart Workflow. His...
Question 268: Which of the following commands shows full synchronization s...
Question 269: In Cluster XL, _______ is defined by default as a critical d...
Question 270: Which type of routing relies on a VPN Tunnel Interface (VTI)...
Question 271: Choose the BEST sequence for configuring user management in ...
Question 272: You have installed Secure Platform R76 as Security Gateway o...
Question 273: The Management Portal Software Blade allows users to...
Question 274: Which of the following QoS rule action properties is an Adva...
Question 275: The process that performs the authentication for legacy sess...
Question 276: Which specific R76 GUI would you use to view the length of t...
Question 277: When using Cluster XL in Load Sharing, what is the default m...
Question 278: Security server configuration settings are stored in _______...
Question 279: Due to some recent performance issues, you are asked to add ...
Question 280: Which of the following is the default port for Management Po...
Question 281: Match the VPN-related terms with their definitions: (Exhibit...
Question 282: When using IPS, what does Geo protection do?...
Question 283: What happens to the session information after they are appro...
Question 284: SIMULATION Fill in the blank. To enter the router shell, use...
Question 285: Which of the following commands shows full synchronization s...
Question 286: If Smart Workflow is configured to work without Sessions or ...
Question 287: Which service type does NOT invoke a Security Server?...
Question 288: How do you run "CPSIZEME" on SPLAT?...
Question 289: Which of the following items should be configured for the Se...
Question 290: What is the greatest benefit derived from VPNs compared to f...
Question 291: Which of the following would be a result of having more than...
Question 292: SIMULATION Type the full fw command and syntax that will sho...
Question 293: When, during policy installation, does the atomic load task ...
Question 294: You enable Sweep Scan Protection and Host port scan in IPS t...
Question 295: You are the Security Administrator for ABC-Corp. A Check Poi...
Question 296: Which specific R76 GUI would you use to view the length of t...
Question 297: What is a requirement for setting up R76 Management High Ava...
Question 298: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 299: What gives administrators more flexibility when configuring ...
Question 300: The Identity Agent is a lightweight endpoint agent that auth...
Question 301: DShield is a Check Point feature used to block which of the ...
Question 302: Multi Corp has bought company Omni Corp and now has two acti...
Question 303: You enable Hide NAT on the network object, 10.1.1.0 behind t...
Question 304: When configuring an LDAP Group object, select option _______...
Question 305: Which of the following statements is TRUE concerning MEP VPN...
Question 306: Jerry is concerned that a denial-oF. service (DoS) attack ma...
Question 307: When configuring an LDAP Group object, which option should y...
Question 308: Each entry in Smart Directory has a unique _______________ ?...
Question 309: __________ is a proprietary Check Point protocol. It is the ...
Question 310: A host on the Internet initiates traffic to the Static NAT I...
Question 311: In R76, My Organization e-mail addresses or domains are used...
Question 312: Your perimeter Security Gateway's external IP is 200.200.200...
Question 313: A Cluster XL configuration is limited to ___ members....
Question 314: Which command would you use to save the routing information ...
Question 315: User definitions are stored in ________________ ....
Question 316: What is the maximum number of cores supported by Core XL?...
Question 317: Which of these is a type of acceleration in Secure XL?...
Question 318: In New Mode HA, the internal cluster IP VIP address is 10.4....
Question 319: Which procedure will create an Internal User?...
Question 320: Which application is used to create a File-Share Application...
Question 321: When using AD Query to authenticate users for Identity Aware...
Question 322: Which process is responsible for delta synchronization in Cl...
Question 323: Which procedure enables the SSL VPN blade on the gateway?...
Question 324: Which version is the minimum requirement for Smart Provision...
Question 325: The We-Make-Widgets company has purchased twenty UTM-1 Edge ...
Question 326: What process manages the dynamic routing protocols (OSPF, RI...
Question 327: Which Check Point QoS feature allows a Security Administrato...
Question 328: Which of the following explains Role Segregation?...
Question 329: What is the benefit to running Smart Event in Learning Mode?...
Question 330: When using migrate to upgrade a Secure Management Server, wh...
Question 331: A Security Administrator opens a new session, makes changes ...
Question 332: You want to create an IKE VPN between two VPN-1 NGX Security...
Question 333: Which Protection Mode does not exist in IPS?...
Question 334: How does a standby Smart Center Server receive logs from all...
Question 335: What is the benefit to running Smart Event in Learning Mode?...
Question 336: You want to block corporate internal-net and local net from ...
Question 337: Which of the following log files contains information about ...
Question 338: Which three of the following are Cluster XL member requireme...
Question 339: Check Point New Mode HA is a(n) _________ solution....
Question 340: When migrating the Smart Event data base from one server to ...
Question 341: Check Point recommends that you back up systems running Chec...
Question 342: MEP VPN's use the Proprietary Probing Protocol to send speci...
Question 343: Your customer, Mr. Smith needs access to other networks and ...
Question 344: Which of the following allows administrators to allow or den...
Question 345: Charles requests a Website while using a computer not in the...
Question 346: You are a SSL VPN Administrator. Your users complain that th...
Question 347: Which of the following tools is used to generate a Security ...
Question 348: SIMULATION To provide full connectivity upgrade status, use ...
Question 349: What configuration change must you make to change an existin...
Question 350: Which of the following SSL Network Extender server-side prer...
Question 351: In a distributed VPN-1 Pro NGX environment, where is the Int...
Question 352: When defining Smart Directory for High Availability (HA), wh...
Question 353: The technical-support department has a requirement to access...
Question 354: In order to have full control, you decide to use Manual NAT ...
Question 355: Micro Corp experienced a security appliance failure. (LEDs o...
Question 356: How do you upload the results of "CPSIZEME" to Check Point w...
Question 357: Identity Agent is a lightweight endpoint agent that authenti...
Question 358: After repairing a Smart Workflow session:...
Question 359: Which Check Point address translation method is necessary if...
Question 360: Match the Cluster XL modes with their configurations. Exhibi...
Question 361: Check Point recommends deploying SSL VPN:...
Question 362: To configure the Cluster Control Protocol (CCP) to use Broad...
Question 363: Which Security Server can perform authentication tasks, but ...
Question 364: Which of the following is a TRUE statement concerning contra...
Question 365: How is Smart Workflow enabled?
Question 366: What is the meaning of the option Connect to the Internet?...
Question 367: Which command displays the installed Security Gateway versio...
Question 368: Using the Backup Target functionality in Smart Provisioning,...
Question 369: Regarding QoS guarantees and limits, which of the following ...
Question 370: You want to generate a cpinfo file via CLI on a system runni...
Question 371: What command will allow you to disable sync on a cluster fir...
Question 372: The process __________ is responsible for the authentication...
Question 373: When upgrading Check Point products in a distributed environ...
Question 374: By default Check Point High Availability components send upd...
Question 375: Which of the following statements accurately describes the c...
Question 376: Which statement is TRUE for route-based VPN's?...
Question 377: You enable Automatic Static NAT on an internal host node obj...
Question 378: What is the best tool to produce a report which represents h...
Question 379: Which Check Point tool allows you to open a debug file and s...
Question 380: How do new connections get established through a Security Ga...
Question 381: Mega Corp is using Smart Center Server with several gateways...
Question 382: Which of the following are valid reasons for beginning with ...
Question 383: Jacob is using a mesh VPN Community to create a sitE. to-sit...
Question 384: What command with appropriate switches would you use to test...
Question 385: You intend to upgrade a Check Point Gateway from R65 to R76....
Question 386: The following configuration is for VPN-1 NGX:1s this configu...
Question 387: If Jack was concerned about the number of log entries he wou...
Question 388: Provisioning Profiles can NOT be applied to:...
Question 389: Rachel is the Security Administrator for a university. The u...
Question 390: What is a requirement for setting up R76 Management High Ava...
Question 391: Which command would you use to save the interface informatio...
Question 392: The relay mail server configured under Email Notifications i...
Question 393: Where do you verify that Smart Directory is enabled?...
Question 394: Which of the following commands can be used to bind a NIC to...
Question 395: What is the best method for scheduling backup's on multiple ...
Question 396: An internal host initiates a session to www.google.com and i...
Question 397: Which of the following is NOT a feature of Cluster XL?...
Question 398: Match the following commands to their correct function. Each...
Question 399: Among the authentication schemes SSL VPN employs for users, ...
Question 400: The set of rules that governs the types of objects in the di...
Question 401: SIMULATION Type the command and syntax that you would use to...
Question 402: What type of packet does a VPN-1 Secure Client send to its P...
Question 403: You must set up SIP with a proxy for your network. IP phones...
Question 404: In a UNIX environment, Smart Reporter Data Base settings cou...
Question 405: Your users are defined in a Windows 2008 Active Directory se...
Question 406: Which of the following is a valid Active Directory designati...
Question 407: Which protocol can be used to provide logs to third-party re...
Question 408: SIMULATION Fill in the blank. In Load Sharing Unicast mode, ...
Question 409: You have three Gateways in a mesh community. Each gateway's ...
Question 410: John Adams is an HR partner in the ACME organization. ACME I...
Question 411: When restoring R76 using the command upgrade import, which o...
Question 412: You find that Gateway fw2 can NOT be added to the cluster ob...
Question 413: Which operating system(s) support(s) unnumbered VPN Tunnel I...
Question 414: Which of the following commands do you run on the AD server ...
Question 415: To run Gaia in 64bit mode, which of the following is true? 1...
Question 416: What is the officially accepted diagnostic tool for IP Appli...
Question 417: How does a cluster member take over the VIP after a failover...
Question 418: The challenges to IT involve deployment, security, managemen...
Question 419: Check Point recommends that you back up systems running Chec...
Question 420: After filtering a fw monitor trace by port and IP, a packet ...
Question 421: A Smart Provisioning Gateway could be a member of which VPN ...
Question 422: Which statement defines Public Key Infrastructure? Security ...
Question 423: What is the behavior of Cluster XL in a High Availability en...
Question 424: You have pushed a policy to your firewall and you are not ab...
Question 425: One profile in Smart Provisioning can update:...
Question 426: Central License management allows a Security Administrator t...
Question 427: Suppose the Security Gateway hard drive fails and you are fo...
Question 428: When synchronizing clusters, which of the following statemen...
Question 429: What happens if the identity of a user is known?...
Question 430: The connection to the Cluster XL member 'A' breaks. The Clus...
Question 431: By default, the Cluster Control Protocol (CCP) uses this to ...
Question 432: Which process should you debug if Smart Dashboard login fail...
Question 433: Your current VPN-1 NG with Application Intelligence (AI) R55...
Question 434: A customer is calling saying one member's status is Down. Wh...
Question 435: You need to publish GAiA routes using the OSPF routing proto...
Question 436: Which of the following actions is most likely to improve the...
Question 437: In Core XL, what process is responsible for processing incom...
Question 438: Where does the security administrator activate Identity Awar...
Question 439: Smart Provisioning uses different types of profiles to manag...
Question 440: Match the VPN-related terms with their definitions. Each cor...
Question 441: Which Check Point product implements a Consolidation Policy?...
Question 442: What are you required to do before running upgrade export?...
Question 443: Your R76 enterprise Security Management Server is running ab...
Question 444: Which process is responsible for kernel table information sh...
Question 445: VPN-1 NGX includes a resource mechanism for working with the...
Question 446: Jon is explaining how the inspection module works to a colle...
Question 447: You are running a R76 Security Gateway on Secure Platform. I...
Question 448: What could the following regular expression be used for in a...
Question 449: Which of the following does IPSec use during IPSec key negot...
Question 450: What is the supported Cluster XL configuration when configur...
Question 451: What is the command to enter the router shell?...
Question 452: What are the 3 main components of the Smart Event Software B...
Question 453: When connecting to the SSL VPN portal, you receive a pop-up ...
Question 454: When using Smart Dashboard to manage existing users in Smart...
Question 455: Which of the following commands shows full synchronization s...
Question 456: Where do you verify that Smart Directory is enabled?...
Question 457: Which of these components does NOT require a VPN-1 NGX R65 l...
Question 458: Assume you are a Security Administrator for ABCTech. You hav...
Question 459: How should Check Point packages be uninstalled?...
Question 460: VPN routing can also be configured by editing which file?...
Question 461: Review the rules. Assume domain UDP is enabled in the impled...
Question 462: You are reviewing Smart View Tracker entries, and see a Conn...
Question 463: How does Check Point recommend that you secure the sync inte...
Question 464: SIMULATION Complete this statement. To save interface inform...
Question 465: Which of the following items should be configured for the Se...
Question 466: Network applications accessed using SSL Network Extender hav...
Question 467: How do you enable Secure XL (command line) on GAiA?...
Question 468: Your company's Security Policy forces users to authenticate ...
Question 469: Your current VPN-1 NG with Application Intelligence (Al) R55...
Question 470: After you add new interfaces to a cluster, how can you check...
Question 471: You are the Mega Corp Security Administrator. This company u...
Question 472: Math the Smart Dashboard session status icons with the appro...
Question 473: SIMULATION The command useful for debugging by capturing pac...
Question 474: Review the Rule Base displayed. (Exhibit) For which rules wi...
Question 475: While authorization for users managed by Smart Directory is ...
Question 476: Because of pre-existing design constraints, you set up manua...
Question 477: What is not available for Express Reports compared to Standa...
Question 478: Which of the listed load-balancing methods is NOT valid?...
Question 479: Which changes are tracked by Smart Workflow?...
Question 480: Which of the following components contains the Events Data B...
Question 481: What is the lowest possible version a Security Gateway may b...
Question 482: SIMULATION Fill in the blank. To remove site-to-site IKE and...
Question 483: The Management Portal allows all of the following EXCEPT:...
Question 484: If your firewall is performing a lot of IPS inspection and t...
Question 485: David wants to manage hundreds of gateways using a central m...
Question 486: If Cluster XL Load Sharing is enabled with state synchroniza...
Question 487: You are trying to configure Directional VPN Rule Match in th...
Question 488: Steve tries to configure Directional VPN Rule Match in the R...
Question 489: To force clients to use Integrity Secure Workspace when acce...
Question 490: What is the Smart Event Analyzer's function?...
Question 491: What is the Smart Event Client's function?...
Question 492: How many pre-defined exclusions are included by default in S...
Question 493: Your users are defined in a Windows 2008 Active Directory se...
Question 494: With the User Directory Software Blade, you can create R76 u...
Question 495: How can you view the virtual cluster interfaces of a Cluster...
Question 496: Where can you find the Check Point's SNMP MIB file?...
Question 497: When does the Smart Workflow Policy Installation window appe...
Question 498: Using the output below, why is the QoS rule not limiting the...
Question 499: The process ________ is responsible for GUI Client communica...
Question 500: The customer wishes to install a cluster. In his network, th...
Question 501: What is the command to upgrade an NG with Application Intell...
Question 502: Assume an intruder has compromised your current IKE Phase 1 ...
Question 503: Your organization's disaster recovery plan needs an update t...
Question 504: Which encryption scheme provides in-place encryption?...
Question 505: In Company XYZ, the DLP Administrator defined a new Keywords...
Question 506: What does it mean when a Security Gateway is labeled Untrust...
Question 507: Which procedure creates a new administrator in Smart Workflo...
Question 508: There are several Smart Directory (LDAP) features that can b...
Question 509: If traffic requires preferential treatment by other routers ...
Question 510: In R71, how would you define a rule to block all traffic sen...
Question 511: How do you recover communications between your Security Mana...
Question 512: How can you completely tear down a specific VPN tunnel in an...
Question 513: You want VPN traffic to match packets from internal interfac...
Question 514: What Smart Console application allows you to change the Log ...
Question 515: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 516: What is the most common cause for a Quick mode packet 1 fail...
Question 517: Yoav is a Security Administrator preparing to implement a VP...
Question 518: Which of the following statements accurately describes the u...
Question 519: In New Mode HA, the internal cluster IP VIP address is 10.4....
Question 520: You have two IP Appliances: one IP565 and one IP395. Both ap...
Question 521: SIMULATION Fill in the blank. The command that typically gen...
Question 522: Your network is experiencing connectivity problems and you w...
Question 523: Select the command set best used to verify proper failover f...
Question 524: SIMULATION Fill in the blanks. To view the number of concurr...
Question 525: How can you view the critical devices on a cluster member in...
Question 526: During a Security Management Server migrate export, the syst...
Question 527: In Load Sharing Unicast mode, the internal cluster IP addres...
Question 528: What command syntax would you use to turn on PDP logging in ...
Question 529: Your current stands alone VPN-1 NG with Application Intellig...
Question 530: Which of the following commands would you run to remove site...
Question 531: Which Check Point QoS feature marks the ToS byte in the IP h...
Question 532: You have an internal FTP server, and you allow downloading, ...
Question 533: Which is NOT a method through which Identity Awareness recei...
Question 534: You need to back up the routing, interface, and DNS configur...
Question 535: The ________ Check Point Cluster XL mode must synchronize th...
Question 536: SIMULATION Type the full fw command and syntax that allows y...
Question 537: You configure a Check Point QoS Rule Base with two rules: an...
Question 538: What is the default port number for standard TCP connections...
Question 539: What is the primary benefit of using upgrade export over eit...
Question 540: You are concerned that the processor for your firewall runni...
Question 541: When an Endpoint user is able to authenticate but receives a...
Question 542: What is Check Point's Core XL?
Question 543: Which of the following is NOT a restriction for connection t...
Question 544: What step should you take before running migrate_export?...
Question 545: In a particular IPS protection in R76 in the Logging Setting...
Question 546: You are responsible for the IPS configuration of your Check ...
Question 547: Complete this statement from the options provided. Using Cap...
Question 548: When restoring a Security Management Server from a backup fi...
Question 549: ______________ is NOT an Smart Event event-triggered Automat...
Question 550: What is the purpose of the pre-defined exclusions included w...
Question 551: You have a High Availability Cluster XL configuration. Machi...
Question 552: Which of the following statements about the Port Scanning fe...
Question 553: You plan to incorporate OPSEC servers, such as Web sense and...
Question 554: Which of the following commands can provide the most complet...
Question 555: In the following command, LSMcli [-d] &lt;server&gt;&lt;user...
Question 556: The User Directory Software Blade is used to integrate which...
Question 557: How could you compare the Fingerprint shown to the Fingerpri...
Question 558: Which of the following CLISH commands would you use to set t...
Question 559: Which statement about LDAP and Active Directory (AD) with SS...
Question 560: For a dedicated DLP Gateway that runs in inline bridge mode,...
Question 561: What tools CANNOT be launched from Smart Update NGX R65?...
Question 562: Public-key cryptography is considered which of the following...
Question 563: The User Directory Software Blade is used to integrate which...
Question 564: Your primary Security Management Server runs on GAiA. What i...
Question 565: To help organize events, Smart Reporter uses filtered querie...
Question 566: You are preparing computers for a new Cluster XL deployment....
Question 567: Which is NOT a valid option when upgrading Cluster Deploymen...
Question 568: SIMULATION Fill in the blank. To save your OSPF configuratio...
Question 569: SIMULATION In a zero downtime scenario, which command do you...
Question 570: You are a Security Administrator who has installed Security ...
Question 571: A Fast Path Upgrade of a cluster:...
Question 572: Which of the following services will cause Secure XL templat...
Question 573: When configuring a Permanent Tunnel between two gateways in ...
Question 574: Which port is typically used by SSL Network Extender, if the...
Question 575: You have a production implementation of Management High Avai...
Question 576: David is the Multi Corp Security Manager and approves the pr...
Question 577: Based on the following information, which of the statements ...
Question 578: What happens if the identity of a user is known?...
Question 579: Which of the following is NOT a Cluster XL mode?...
Question 580: What is a requirement for setting up Management High Availab...
Question 581: The process _______ executes the authentication for logging ...
Question 582: The process that performs the authentication for Remote Acce...
Question 583: Which statements about Management HA are correct? 1) Primary...
Question 584: Which protocol is not supported for DLP?...
Question 585: A tracked Smart Event Candidate in a Candidate Pool becomes ...
Question 586: Which three of the following components are required to ge a...
Question 587: How granular may an administrator filter an Access Role with...
Question 588: A customer calls saying that a Load Sharing cluster shows dr...
Question 589: Which describes the function of the account unit?...
Question 590: Mega Corp is using Smart Center Server with several gateways...
Question 591: Where is the ideal place to deploy your SSL VPN?...
Question 592: Which of the following deployment scenarios CANNOT be manage...
Question 593: Security Gateway R76 supports User Authentication for which ...
Question 594: Damon enables an SMTP resource for content protection. He no...
Question 595: You are the Security Administrator for Mega Corp. A Check Po...
Question 596: To verify Secure XL statistics you would use the command ___...
Question 597: You have configured an LDAP account unit and confirmed the A...
Question 598: In the following cluster configuration; if you reboot sglond...
Question 599: The Smart Provisioning management concept is based on:...
Question 600: Where do Gateways managed by Smart Provisioning fetch their ...
Question 601: In Cluster XL, _______ is defined by default as a critical d...
Question 602: Which Check Point product is used to create and save changes...
Question 603: Which of the following files is used to allow only specific ...
Question 604: Which of the following can NOT approve a change in a Smart W...
Question 605: Can you upgrade R71 directly to R76?...
Question 606: Typically, when you upgrade the Security Management Server, ...
Question 607: Which is the BEST configuration option to protect internal u...
Question 608: What is the behavior of Cluster XL in a High Availability en...
Question 609: Which of the following is NOT defined by an Access Role obje...
Question 610: Which three of the following components are required to get ...
Question 611: Which load-balancing method below is NOT valid?...
Question 612: In a Windows environment, Smart Reporter Data Base settings ...
Question 613: When Converting Gateways to Smart LSM Security Gateways, you...
Question 614: How can you prevent delay-sensitive applications, such as vi...
Question 615: Using Smart Provisioning Profiles, which of the following co...
Question 616: After installing VPN-1 Pro NGQ R65, you discover that one po...
Question 617: Which of the following is NOT part of the policy installatio...
Question 618: Which of the following TCP port numbers is used to connect t...
Question 619: You want to upgrade an NG with Application Intelligence R55 ...
Question 620: Which of the following methods will provide the most complet...
Question 621: You have configured Automatic Static NAT on an internal host...
Question 622: When a security administrator logs in to Smart Dashboard and...
Question 623: What is Check Point's Secure XL?...
Question 624: What is the primary benefit of using upgrade export over eit...
Question 625: Wayne configures an HTTP Security Server to work with the co...
Question 626: What is the advantage for deploying SSL VPN in a DMZ, versus...
Question 627: The process ________ is responsible for Management High Avai...
Question 628: What can be said about RSA algorithms? Select all that apply...
Question 629: You want to verify that your Check Point cluster is working ...
Question 630: Which of the following methods will provide the most complet...
Question 631: You are running the license upgrade tool on your Secure Plat...
Question 632: Your network traffic requires preferential treatment by othe...
Question 633: Which of the following is NOT a Smart Event Permission Profi...
Question 634: Which command would you use to save the IP address and routi...
Question 635: When using Connecter with Endpoint Security Policies, what o...
Question 636: Which type of service should a Security Administrator use in...
Question 637: The process ________________ compiles $FWDIR/conf/*.W files ...
Question 638: Mega Corps' disaster recovery plan is past due for an update...
Question 639: For proper system operation, the Administrator has to config...
Question 640: Which of the following items can be provisioned via a Profil...
Question 641: What Smart Console application allows you to change the Smar...
Question 642: To configure a Security Management Server for an SSL VPN Gat...
Question 643: Which of the following provides a unique user ID for a digit...
Question 644: For an initial installation of Connecter, which of the follo...
Question 645: What could be a reason why synchronization between primary a...
Question 646: The following diagram illustrates how a VPN-1 Secure Client ...
Question 647: Laura notices the Microsoft Visual Basic Bits Protection is ...
Question 648: What is the router command to save your OSPF configuration?...
Question 649: When distributing IPSec packets to gateways in a Load Sharin...
Question 650: What is the correct policy installation process order? 1. Ve...
Question 651: When troubleshooting user authentication, you may see the fo...
Question 652: How would you configure a rule in a Security Policy to allow...
Question 653: When using Smart Workflow, how many sessions can be in progr...
Question 654: Your customer wishes to use Smart Workflow Software Blade, b...
Question 655: SIMULATION Fill in the blank with a numeric value. The defau...
Question 656: Greg is creating rules and objects to control VoIP traffic i...
Question 657: Choose all correct statements. Smart Update, located on a VP...
Question 658: Which statement is TRUE for route-based VPNs?...
Question 659: Frank is concerned with performance and wants to configure t...
Question 660: Your customer asks you about the Performance Pack. You expla...
Question 661: What command syntax would you use to see accounts the gatewa...
Question 662: Which Name Resolution protocols are supported in SSL VPN?...
Question 663: Which Check Point QoS feature is used to dynamically allocat...
Question 664: In Smart Workflow, what is NOT a valid possibility?...
Question 665: What is a task of the Smart Event Client?...
Question 666: How is change approved for implementation in Smart Workflow?...
Question 667: Which internal user authentication protocols are supported i...
Question 668: How frequently does CPSIZEME run by default?...
Question 669: Which of the following are authentication methods that Secur...
Question 670: You find that Users are not prompted for authentication when...
Question 671: Captive Portal is a __________ that allows the gateway to re...
Question 672: When upgrading to NGX R65, which Check Point products do not...
Question 673: The ______________ contains the Events Data Base....
Question 674: Which of the following statements is TRUE concerning MEP VPN...
Question 675: If using AD Query for seamless identity data reception from ...
Question 676: Which command will erase all CRL's?...
Question 677: You can NOT use Smart Dashboard's Smart Directory features t...
Question 678: From the following output of cphaprob state, which Cluster X...
Question 679: Which of the following authentication methods can be configu...
Question 680: Where do you define NAT properties so that NAT is performed ...
Question 681: Which component receives events and assigns severity levels ...
Question 682: You need to verify the effectiveness of your IPS configurati...
Question 683: Public keys and digital certificates provide which of the fo...
Question 684: In a Management High Availability (HA) configuration, you ca...
Question 685: If a digital signature is used to achieve both data-integrit...
Question 686: When using Captive Portal to send unidentified users to a We...
Question 687: When configuring an LDAP Group object, which option should y...
Question 688: Your primary Security Management Server runs on GAiA. What i...
Question 689: Which external user authentication protocols are supported i...
Question 690: Your main internal network 10.10.10.0/24 allows all traffic ...
Question 691: Which Check Point address translation method allows an admin...
Question 692: What physical machine must have access to the User Center pu...
Question 693: Review the cphaprob state command output from one New Mode H...
Question 694: SIMULATION To bind a NIC to a single processor when using Co...
Question 695: For best performance in Event Correlation, you should use:...
Question 696: Snapshot is available on which Security Management Server an...
Question 697: When configuring numbered VPN Tunnel Interfaces (VTIs) in a ...
Question 698: Which operating system(s) support(s) unnumbered VPN Tunnel I...
Question 699: Which command will only show the number of entries in the co...
Question 700: How can you check whether IP forwarding is enabled on an IP ...
Question 701: Your network includes Cluster XL running Multicast mode on t...
Question 702: Your internal network is configured to be 10.1.1.0/24. This ...
Question 703: Even after configuring central logging on Connecter, Connect...
Question 704: Which of the following is an example of the hash function?...
Question 705: Before upgrading Secure Platform, you should create a backup...
Question 706: How do you check the version of "CPSIZEME" on GAiA?...
Question 707: You are troubleshooting a HTTP connection problem. You've st...
Question 708: You are reviewing computer information collected in Client I...
Question 709: Where can a Security Administrator adjust the unit of measur...
Question 710: SIMULATION Fill in the blank. To verify Secure XL statistics...
Question 711: Which is the lowest Gateway version manageable by Smart Cent...
Question 712: When do modifications to the Event Policy take effect?...
Question 713: Which of the following platforms does NOT support Secure XL?...
Question 714: There are times when you want to use Link Selection to manag...
Question 715: Users with Identity Awareness Agent installed on their machi...
Question 716: What is a "sticky" connection?
Question 717: A VPN Tunnel Interface (VTI) is defined on Secure Platform P...
Question 718: Your customer wishes to install Smart Workflow on top of R70...
Question 719: Your company is running Security Management Server R76 on GA...
Question 720: What is NOT a valid LDAP use in Check Point Smart Directory?...
Question 721: Several Security Policies can be used for different installa...
Question 722: SIMULATION In a zero downtime firewall cluster environment, ...
Question 723: Which of the following are supported with the office mode? S...
Question 724: In Smart Dashboard, Translate destination on client side is ...
Question 725: Your R7x-series Enterprise Security Management Server is run...
Question 726: State Synchronization is enabled on both members in a cluste...
Question 727: Where is it necessary to configure historical records in Sma...
Question 728: The following graphic illustrates which command being issued...
Question 729: The process_________executes the authentication for Remote A...
Question 730: Your customer complains of the weak performance of his syste...
Question 731: In Cluster XL R76; when configuring a cluster synchronizatio...
Question 732: When using Secure Platform, it might be necessary to tempora...
Question 733: Using the output below, what does the red flag indicate for ...
Question 734: As a Security Administrator, you must refresh the Client Aut...
Question 735: When Load Sharing Multicast mode is defined in a Cluster XL ...
Question 736: What action can be run from Smart Update NGX R65?...
Question 737: In which Cluster XL Load Sharing mode, does the pivot machin...
Question 738: Your company has two headquarters, one in London, one in New...
Question 739: Which of the following is TRUE concerning numbered VPN Tunne...
Question 740: The Totally Cool Security Company has a large security staff...
Question 741: To qualify as an Identity Awareness enabled rule, which colu...
Question 742: To configure a client to properly log in to the user portal ...
Question 743: When defining an Organizational Unit, which of the following...
Question 744: Which command allows you to view the contents of an R76 tabl...
Question 745: You use the snapshot feature to store your Connecter SSL VPN...
Question 746: What is the proper command for importing users into the R77 ...
Question 747: The Core XL SND (Secure Network Distributor) is responsible ...
Question 748: What process is responsible for transferring the policy file...
Question 749: Which of the following commands will stop acceleration on a ...
Question 750: You have just upgraded your Load Sharing gateway cluster (bo...
Question 751: SIMULATION Fill in the blank. The user wants to replace a fa...
Question 752: Consider the following actions that VPN-1 NGX can take when ...
Question 753: Concerning these products: Secure Platform, VPN-1 Pro Gatewa...
Question 754: You are running R71 and using the new IPS Software Blade. To...
Question 755: When running DLP Wizard for the first time, which of the fol...
Question 756: Review the R76 configuration. (Exhibit) Is it correct for Ma...
Question 757: Assuming all connections that are allocated bandwidth in you...
Question 758: What is the significance of the depicted icon in the Smart W...
Question 759: Which of the following is part of the PKI? Select all that a...
Question 760: Which of the following operating systems support numbered VT...
Question 761: When configuring site-to-site VPN High Availability (HA) wit...
Question 762: Which file defines the fields for each object used in the fi...
Question 763: Steve is troubleshooting a connection problem with an intern...
Question 764: Match the Best Management High Availability synchronization-...
Question 765: What is the command to upgrade a Secure Platform NG with App...
Question 766: Identify the correct step performed by Smart Update to upgra...
Question 767: Stephanie wants to reduce the encryption overhead and improv...
Question 768: How do you verify a VPN Tunnel Interface (VTI) is configured...
Question 769: Which operating system is NOT supported by VPN-1 Secure Clie...
Question 770: You are using trace logger to debug SSL VPN's server side an...
Question 771: You have pushed a policy to your firewall and you are not ab...
Question 772: Please review the following QoS policy: (Exhibit) Assume you...
Question 773: A Full Connectivity Upgrade of a cluster:...
Question 774: How do you configure the Security Policy to provide user acc...
Question 775: John Adams is an HR partner in the ACME organization. ACME I...
Question 776: Your R76 primary Security Management Server is installed on ...
Question 777: In cryptography, the Rivest, Shamir, Adelman (RSA) scheme ha...
Question 778: What is a task of the Smart Event Server?...
Question 779: Which of the following is NOT supported by Core XL?...
Question 780: You start the configuration of Smart Workflow. Smart Workflo...
Question 781: When you check Web Server in a host-node object, what happen...
Question 782: A user cannot authenticate to SSL VPN. You have verified the...
Question 783: The third-shift Administrator was updating Security Manageme...
Question 784: When a packet is flowing through the security gateway, which...
Question 785: SIMULATION Multi Corp is located in Atlanta. It has a branch...
Question 786: The Smart Event Correlation Unit:...
Question 787: You are configuring the VoIP Domain object for a Skinny Clie...
Question 788: _____________ generates a Smart Event Report from its SQL da...
Question 789: You are a SSL VPN administrator. Your users complain that th...
Question 790: Which of the following functions CANNOT be performed in Clie...
Question 791: VPN access control would fall under which VPN component?...
Question 792: What are you required to do before running the command upgra...
Question 793: SIMULATION Type the full cphaprob command and syntax that wi...
Question 794: What is a requirement for setting up R77 Management High Ava...
Question 795: What port is used for communication to the User Center with ...
Question 796: All R76 Security Servers can perform authentication with the...
Question 797: Mark the configuration options that are available for Data L...
Question 798: Your organization maintains several IKE VPN's. Executives in...
Question 799: Which component functions as the Internal Certificate Author...
Question 800: What firewall kernel table stores information about port all...
Question 801: Your VPN Community includes three Security Gateways. Each Ga...
Question 802: The process that performs the authentication for Smart Dashb...
Question 803: What cluster mode is represented in this case? (Exhibit)...
Question 804: You want to establish a VPN, using certificates. Your VPN wi...
Question 805: SIMULATION Fill in the blank. To verify the Secure XL status...
Question 806: Mega Corp is running Smart center R70, some Gateways at R65 ...
Question 807: How does Cluster XL Unicast mode handle new traffic?...
Question 808: The following rule contains an FTP resource object in the Se...
Question 809: With the User Directory Software Blade, you can create R77 u...
Question 810: What is the syntax for uninstalling a package using newpkg?...
Question 811: Remote clients are using IPSec VPN to authenticate via LDAP ...
Question 812: What is a possible reason for the grayed out Restore Version...