<< Prev Question Next Question >>

Question 6/79

Firewall policies must be configured to accept VRRP packets on the GAiA platform if it runs Firewall software. The Multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for VRRP is:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (79q)
Question 1: When defining QoS global properties, which option below is n...
Question 2: Check Point APIs allow system engineers and developers to ma...
Question 3: What is the most ideal Synchronization Status for Security M...
Question 4: Which one of these is NOT a firewall chain?...
Question 5: Which packet info is ignored with Session Rate Acceleration?...
Question 6: Firewall policies must be configured to accept VRRP packets ...
Question 7: After successfully exporting a policy package, how would you...
Question 8: Why would you not see a CoreXL configuration option in cpcon...
Question 9: How many images are included with Check Point TE appliance i...
Question 10: What is the purpose of Priority Delta in VRRP?...
Question 11: Which deployment methods can an administrator choose when de...
Question 12: What's true about Troubleshooting option in the IPS profile ...
Question 13: Mobile Access supports all of the following methods of Link ...
Question 14: What CLI command compiles and installs a Security Policy on ...
Question 15: Sticky Decision Function (SDF) is required to prevent which ...
Question 16: As an administrator, you may be required to add the company ...
Question 17: In which case is a Sticky Decision Function relevant?...
Question 18: SmartEvent does NOT use which of the following procedures to...
Question 19: Which command will reset the kernel debug options to default...
Question 20: Full synchronization between cluster members is handled by F...
Question 21: What is the responsibility of SOLR process on R80.10 managem...
Question 22: What command would show the API server status?...
Question 23: What can you do to see the current number of kernel instance...
Question 24: What happen when IPS profile is set in Detect-Only Mode for ...
Question 25: VPN Tunnel Sharing can be configured with any of the options...
Question 26: Using mgmt_cli, what is the correct syntax to import a host ...
Question 27: The Firewall kernel is replicated multiple times, therefore:...
Question 28: When doing a Stand-Alone Installation, you would install the...
Question 29: On R80.10 when configuring Third-Party devices to read the l...
Question 30: You need to change the number of firewall instances used by ...
Question 31: You are working with multiple Security Gateways enforcing an...
Question 32: Which is not a blade option when configuring SmartEvent?...
Question 33: When simulating a problem on CLusterXL cluster with cphaprob...
Question 34: Choose the ClusterXL process that is defined by default as a...
Question 35: What is a feature that enables VPN connections to successful...
Question 36: NAT rules are prioritized in which order? 1. Automatic Stati...
Question 37: What are the three components for Check Point Capsule?...
Question 38: Which of the SecureXL templates are enabled by default on Se...
Question 39: Which Check Point software blades could be enforced under Th...
Question 40: You have existing dbedit scripts from R77. Can you use them ...
Question 41: Which is NOT an example of a Check Point API?...
Question 42: What is the valid range for VRID value in VRRP configuration...
Question 43: What are the methods of SandBlast Threat Emulation deploymen...
Question 44: During inspection of your Threat Prevention logs you find fo...
Question 45: You noticed that CPU cores on the Security Gateway are usual...
Question 46: What is the command to see cluster status in cli expert mode...
Question 47: In Gaia, if one is unsure about a possible command, what com...
Question 48: Fill in the blank: The command _______________ provides the ...
Question 49: What is the mechanism behind Threat Extraction?...
Question 50: The Security Gateway is installed on GAiA R80. The default p...
Question 51: What is the purpose of a SmartEvent Correlation Unit?...
Question 52: You want to store the GAiA configuration in a file for later...
Question 53: Which directory below contains log files?...
Question 54: Which one of these features is NOT associated with the Check...
Question 55: You are investigating issues with two gateway cluster member...
Question 56: Fill in the blank: The R80 utility fw monitoris used to trou...
Question 57: GAiA greatly increases operational efficiency by offering an...
Question 58: Fill in the blank: The tool ___________ generates a R80 Secu...
Question 59: Which is a suitable command to check whether Drop Templates ...
Question 60: What is correct statement about Security Gateway and Securit...
Question 61: Which NAT rules are prioritized first?...
Question 62: Security Checkup Summary can be easily conducted within:...
Question 63: When Dynamic Dispatcher is enabled, connections are assigned...
Question 64: Which command shows the current connections distributed by C...
Question 65: SecureXL improves non-encrypted firewall traffic throughput ...
Question 66: What is the least ideal Synchronization Status for Security ...
Question 67: The CDT utility supports which of the following?...
Question 68: What makes Anti-Bot unique compared to other Threat Preventi...
Question 69: What does the command vpn crl__zapdo?...
Question 70: In SPLAT the command to set the timeout was idle. In order t...
Question 71: As a valid Mobile Access Method, what feature provides Capsu...
Question 72: You want to verify if your management server is ready to upg...
Question 73: Which of the following statements is TRUE about R80 manageme...
Question 74: Which command will allow you to see the interface status?...
Question 75: If the Active Security Management Server fails or if it beco...
Question 76: What is true of the API server on R80.10?...
Question 77: Which command is used to display status information for vari...
Question 78: What GUI client would you use to view an IPS packet capture?...
Question 79: Tom has been tasked to install Check Point R80 in a distribu...