Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When defining QoS global properties, which option below is not valid?

A.

Weight

B.

Authenticated timeout

C.

Schedule

D.

Rate

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:

A.

Rename the hostname of the Standby member to match exactly the hostname of the Active member.

B.

Change the Standby Security Management Server to Active.

C.

Change the Active Security Management Server to Standby.

D.

Manually synchronize the Active and Standby Security Management Servers.

Alice works for a big security outsourcing provider company and as she receives a lot of change requests per day she wants to use for scripting daily (asks the API services from Check Point fof the Management API. Firstly she needs to be aware if the API services are running for the management. Which of the following Check Point Command is true:

A.

api mgmt status

B.

api status

C.

status api

D.

status mgmt apt

Fill in the blank: An identity server uses a __________ for user authentication.

A.

Shared secret

B.

Certificate

C.

One-time password

D.

Token

Which command collects diagnostic data for analyzing customer setup remotely?

A.

cpinfo

B.

migrate export

C.

sysinfo

D.

cpview

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Which view is NOT a valid CPVIEW view?

A.

IDA

B.

RAD

C.

PDP

D.

VPN

fwssd is a child process of which of the following Check Point daemons?

A.

fwd

B.

cpwd

C.

fwm

D.

cpd

Which command can you use to enable or disable multi-queue per interface?

A.

cpmq set

B.

Cpmqueue set

C.

Cpmq config

D.

St cpmq enable

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

A.

upgrade_import

B.

cpconfig

C.

fwm dbimport -p

D.

cpinfo –recover

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

A.

User data base corruption

B.

LDAP conflicts

C.

Traffic issues

D.

Phase two key negotiations

What are the different command sources that allow you to communicate with the API server?

A.

SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

B.

SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

C.

SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services

D.

API_cli Tool, Gaia CLI, Web Services

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

A.

Host having a Critical event found by Threat Emulation

B.

Host having a Critical event found by IPS

C.

Host having a Critical event found by Antivirus

D.

Host having a Critical event found by Anti-Bot

Which TCP-port does CPM process listen to?

A.

18191

B.

18190

C.

8983

D.

19009

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

A.

It will generate Geo-Protection traffic

B.

Automatically uploads debugging logs to Check Point Support Center

C.

It will not block malicious traffic

D.

Bypass licenses requirement for Geo-Protection control