Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

With SecureXL enabled, accelerated packets will pass through the following:

A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

What are the methods of SandBlast Threat Emulation deployment?

A.

Cloud, Appliance and Private

B.

Cloud, Appliance and Hybrid

C.

Cloud, Smart-1 and Hybrid

D.

Cloud, OpenServer and Vmware

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

A.

INSPECT Engine

B.

Stateful Inspection

C.

Packet Filtering

D.

Application Layer Firewall

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

A.

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.

B.

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.

C.

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.

D.

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.

How many cores can be used in a Cluster for Firewall-kernel on the new device?

A.

3

B.

2

C.

1

D.

4

When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:

A.

All UDP packets

B.

All IPv6 Traffic

C.

All packets that match a rule whose source or destination is the Outside Corporate Network

D.

CIFS packets

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

What will SmartEvent automatically define as events?

A.

Firewall

B.

VPN

C.

IPS

D.

HTTPS

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

A.

SmartCenter Server cannot reach this Security Gateway.

B.

There is a blade reporting a problem.

C.

VPN software blade is reporting a malfunction.

D.

Security Gateway’s MGNT NIC card is disconnected.

Which path below is available only when CoreXL is enabled?

A.

Slow path

B.

Firewall path

C.

Medium path

D.

Accelerated path

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:

A.

Create new dashboards to manage 3rd party task

B.

Create products that use and enhance 3rd party solutions

C.

Execute automated scripts to perform common tasks

D.

Create products that use and enhance the Check Point Solution

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

A.

Automatic proxy ARP configuration can be enabled

B.

Translate Destination on Client Side should be configured

C.

fw ctl proxy should be configured

D.

local.arp file must always be configured

What is the command to show SecureXL status?

A.

fwaccel status

B.

fwaccel stats -m

C.

fwaccel -s

D.

fwaccel stat

One of major features in R81 SmartConsole is concurrent administration.

Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?

A.

A lock icon shows that a rule or an object is locked and will be available.

B.

AdminA and AdminB are editing the same rule at the same time.

C.

A lock icon next to a rule informs that any Administrator is working on this particular rule.

D.

AdminA, AdminB and AdminC are editing three different rules at the same time.

Check Point security components are divided into the following components:

A.

GUI Client, Security Gateway, WebUI Interface

B.

GUI Client, Security Management, Security Gateway

C.

Security Gateway, WebUI Interface, Consolidated Security Logs

D.

Security Management, Security Gateway, Consolidate Security Logs