Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer

A.

Save and install the Policy

B.

Delete older versions of database

C.

Revert the session.

D.

Publish or discard the session

Fill in the blanks: Gaia can be configured using _______ the ________.

A.

Command line interface; WebUI

B.

Gaia Interface; GaiaUI

C.

WebUI; Gaia Interface

D.

GaiaUI; command line interface

What is the user ID of a user that have all the privileges of a root user?

A.

User ID 1

B.

User ID 2

C.

User ID 0

D.

User ID 99

Which of the following cannot be configured in an Access Role Object?

A.

Networks

B.

Users

C.

Time

D.

Machines

Fill in the blank: In order to install a license, it must first be added to the ____________.

A.

User Center

B.

Package repository

C.

Download Center Web site

D.

License and Contract repository

You can see the following graphic:

What is presented on it?

A.

Properties of personal. p12 certificate file issued for user John.

B.

Shared secret properties of John’s password.

C.

VPN certificate properties of the John’s gateway.

D.

Expired. p12 certificate properties for user John.

Core Protections are installed as part of what Policy?

A.

Access Control Policy.

B.

Desktop Firewall Policy

C.

Mobile Access Policy.

D.

Threat Prevention Policy.

Which Check Point supported authentication scheme typically requires a user to possess a token?

A.

RADIUS

B.

Check Point password

C.

TACACS

D.

SecurlD

What default layers are included when creating a new policy layer?

A.

Application Control, URL Filtering and Threat Prevention

B.

Access Control, Threat Prevention and HTTPS Inspection

C.

Firewall, Application Control and IPSec VPN

D.

Firewall, Application Control and IPS

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing