Which of the following is not one of the relational database domains that stores the management configuration?
A. User Domain
B. System Domain
C. Global Domain
D. Audit Domain
What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?
A. .cap
B. .exe
C. .tgz
D. .pcap
Which of the following features is supported in Check Point's implementation of IPv6?
A. Security Servers
B. QoS
C. ClusterXL High Availability
D. SAM
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules
B. Create a separate Security Policy package for each remote Security Gateway
C. Create network objects that restrict all applicable rules to only certain networks
D. Run separate SmartConsole instances to login and configure each Security Gateway directly
What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?
A. avsp
B. dlpu and rad processes
C. cpta
D. cpm and fwm
Which of the following ports are used for SIC?
A. 18355 and 18356
B. 18210 and 18211
C. 257 and 258
D. 18192 and 18193
What does CMI stand for in relation to the Access Control Policy?
A. Content Matching Infrastructure
B. Content Management Interface
C. Context Management Infrastructure
D. Context Manipulation Interface
Which of the following is NOT a feature of ClusterXL?
A. Transparent upgrades
B. Zero downtime for mission-critical environments with State Synchronization
C. Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)
D. Transparent failover in case of device failures
Which of the following commands does not initiate full synchronization?
A. clusterXL_admin down –p
B. clusterXL_admin up –p
C. cphaprob –d faildevice –s problem report
D. cphaprob –d faildevice –t 0 –s ok register
What are some measures you can take to prevent IPS false positives?
A. Exclude problematic services from being protected by IPS (sip, H.323, etc.)
B. Use IPS only in Detect mode
C. Use Recommended IPS profile
D. Capture packets, Update the IPS database, and Back up custom IPS files