Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?

A.

All options stop Check Point processes

B.

backup

C.

migrate export

D.

snapshot

In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)

A.

SmartConsole and WebUI on the Security Management Server.

B.

SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed.

C.

Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.

D.

mgmt_cli (API) or WebUI on Security Gateway and SmartConsole on the Security Management Server.

Using ClusterXL, what statement is true about the Sticky Decision Function?

A.

Can only be changed for Load Sharing implementations

B.

All connections are processed and synchronized by the pivot

C.

Is configured using cpconfig

D.

Is only relevant when using SecureXL

Which statement is TRUE of anti-spoofing?

A.

Anti-spoofing is not needed when IPS software blade is enabled

B.

It is more secure to create anti-spoofing groups manually

C.

It is BEST Practice to have anti-spoofing groups in sync with the routing table

D.

With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change

Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?

A.

Threat Emulation

B.

Anti-Malware

C.

Anti-Virus

D.

Threat Extraction

At what point is the Internal Certificate Authority (ICA) created?

A.

During the primary Security Management Server installation process.

B.

Upon creation of a certificate

C.

When an administrator decides to create one

D.

When an administrator initially logs into SmartConsole.

To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?

A.

Protections

B.

IPS Protections

C.

Profiles

D.

ThreatWiki

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:

A.

Rename the hostname of the Standby member to match exactly the hostname of the Active member.

B.

Change the Standby Security Management Server to Active.

C.

Change the Active Security Management Server to Standby.

D.

Manually synchronize the Active and Standby Security Management Servers.

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

A.

Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”

B.

On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”

C.

In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”

D.

On the Security Management Server object, check the box “Identity Logging”

What is true about the IPS-Blade?

A.

in R80, IPS is managed by the Threat Prevention Policy

B.

in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict

C.

in R80, IPS Exceptions cannot be attached to “all rules”

D.

in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same