Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway. What is the purpose of the following RAD configuration file $FWDIR/conf/rad_settings.C?

A.

This file contains the location information for Application Control and/or URL Filtering entitlements

B.

This file contains the information on how the Security Gateway reaches the Security Management Server's RAD service for Application Control and URL Filtering

C.

This file contains RAD proxy settings

D.

This file contains all the host name settings for the online application detection engine

When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?

A.

Kernel Mode

B.

Slow Path

C.

Medium Path

D.

User Mode

What component is NOT part of Unified policy manager?

A.

Classifier

B.

CMI

C.

Handle

D.

Observer

You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.

A.

The output is different between Gateway and Management Server.

B.

CPM is not running and can’t be monitored by WatchDog.

C.

If you want to monitor CPM, you have to manually add it to WatchDog.

D.

CPM is not there because it has its own monitoring system. Only lower processes are monitored by WatchDog.

Which of the following would NOT be a flag when debugging a unified policy?

A.

tls

B.

rulebase

C.

clob

D.

connection

What are the main components of Check Point’s Security Management architecture?

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

A.

R81

B.

R77

C.

R30

D.

R75

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service