Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?
Correct Answer:
D
🗳️
If Bob wanted to create a Management High Availability configuration, what is the minimum number of Security Management servers required in order to achieve his goal?
Correct Answer:
D
🗳️
David wants to manage hundreds of gateways using a central management tool.
What tool would David use to accomplish his goal?
Correct Answer:
B
🗳️
From the following output of cphaprob state, which Cluster XL mode is this?
Correct Answer:
D
🗳️
Which of the following is NOT a feature of Cluster XL?
Correct Answer:
C
🗳️
In which case is a Sticky Decision Function relevant?
Correct Answer:
C
🗳️
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP traffic?
Correct Answer:
C
🗳️
You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?
Correct Answer:
D
🗳️
How do you verify the Check Point kernel running on a firewall?
Correct Answer:
D
🗳️
The process ________________ compiles $FWDIR/conf/*.W files into machine language.
Correct Answer:
A
🗳️