Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.

Which component of SandBlast protection is her company using on a Gateway?

A.

SandBlast Threat Emulation

B.

SandBlast Agent

C.

Check Point Protect

D.

SandBlast Threat Extraction

The admin lost access to the Gaia Web Management Interface but he was able to connect via ssh. How can you check if the web service is enabled, running and which port is used?

A.

In expert mode run #netstat -tulnp | grep httpd to see if httpd is up and to get the port number. In dish run >show web daemon-enable to see if the web daemon is enabled.

B.

In dish run >show web ssl-port to see if the web daemon is enabled and which port is in use. In expert mode run #netstat -anp | grep httpd to see if the httpd is up

C.

In dish run >show web ssl-port to see if the web daemon is enabled and which port is in use. In expert mode run #netstat -anp | grep httpd2 to see if the httpd2 is up

D.

In expert mode run #netstat -tulnp | grep httpd2 to see if httpd2 is up and to get the port number. In dish run >show web daemon-enable to see if the web daemon is enabled.

identity Awareness allows easy configuration for network access, and auditing based on what three items?

A.

Client machine IP address

B.

Network location the identity of a user and the identity of a machine

C.

Log server IP address

D.

Gateway proxy IP address

To optimize Rule Base efficiency, the most hit rules should be where?

A.

Removed from the Rule Base.

B.

Towards the middle of the Rule Base.

C.

Towards the top of the Rule Base.

D.

Towards the bottom of the Rule Base.

How can you grant GAiAAPI Permissions for a newly created user?

A.

Assign the user a permission profile in SmartConsole

B.

Assign the user the admin RBAC role in dish

C.

No need to grant access since every user has access by default.

D.

In bash, use the following command: "gaia_api access --user Tom -enable true"

Which is the lowest gateway version supported by R81.20 management server?

A.

R77.30

B.

R80.20

C.

R77

D.

R65

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

A.

Publish changes

B.

Save changes

C.

Install policy

D.

Install database

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A.

Ask

B.

Drop

C.

Inform

D.

Reject

When performing a minimal effort upgrade, what will happen to the network traffic?

A.

All connections that were initiated before the upgrade will be dropped, causing network downtime

B.

All connections that were initiated before the upgrade will be handled normally

C.

All connections that were initiated before the upgrade will be handled by the standby gateway

D.

All connections that were initiated before the upgrade will be handled by the active gateway

What is the correct order of the default “fw monitor” inspection points?

A.

i, o, l, O

B.

i, l, o, O

C.

1, 2, 3, 4

D.

l, i, O, o

Which component is NOT required to communicate with the Web Services API?

A.

API key

B.

session ID token

C.

content-type

D.

Request payload

How to can you make sure that the old logs will be available after updating the Management to version R81.20 using the Advanced Upgrade Method?

A.

Use the WebUI -> Maintenance > System Backup and store the backup on a remote FTP server

B.

The logs will be included running SFWDIR/scripts/migrate_server export -v R81.20

C.

Use the WebUI to save a snapshot before updating the Management -> Maintenance > Snapshot Management

D.

Use the migrate_server tool with the option '-I' for the logs and '-x' for the index

Which of the following is NOT an attribute of packet acceleration?

A.

Source address

B.

Protocol

C.

Destination port

D.

VLAN Tag

After having saved the Clish Configuration with the "save configuration config.txt" command, where can you find the config.txt file?

A.

You will find it in the home directory of your user account (e.g. /home/admin/)

B.

You can locate the file via SmartConsole > Command Line.

C.

You have to launch the WebUI and go to "Config" -> "Export Config File" and specifiy the destination directory of your local file system.

D.

You cannot locate the file in the file system since Clish does not have any access to the bash file system

What is the best sync method in the ClusterXL deployment?

A.

Use 1 cluster + 1st sync

B.

Use 1 dedicated sync interface

C.

Use 3 clusters + 1st sync + 2nd sync + 3rd sync

D.

Use 2 clusters +1st sync + 2nd sync