Which process is responsible for kernel table information sharing across all cluster members?
A. fwd daemon using an encrypted TCP connection
B. CPHA using an encrypted TCP connection
C. fw kernel using an encrypted TCP connection
D. cpd using an encrypted TCP connection
There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:
A. Probe links for availability.
B. Use links based on Day/Time.
C. Assign links to specific VPN communities.
D. Use links based on authentication method.
When you check Web Server in a host-node object, what happens to the host?
A. The Web server daemon is enabled on the host.
B. More granular controls are added to the host, in addition to Web Intelligence tab settings.
C. You can specify allowed ports in the Web server's node-object properties. You then do not need to list all allowed ports in the Rule Base.
D. IPS Web Intelligence is enabled to check on the host.
How does a standby SmartCenter Server receive logs from all Security Gateways, when an active SmartCenter Server fails over?
A. The remote Gateways must set up SIC with the secondary SmartCenter Server, for logging.
B. Establish Secure Internal Communications (SIC) between the primary and secondary Servers. The secondary Server can then receive logs from the Gateways, when the active Server fails over.
C. On the Log Servers screen (from the Logs and Masters tree on the gateway object's General Properties screen), add the secondary SmartCenter Server object as the additional log server. Reinstall the Security Policy.
D. Create a Check Point host object to represent the standby SmartCenter Server. Then select "Secondary SmartCenter Server" and Log Server", from the list of Check Point Products on the General properties screen.
E. The secondary Server's host name and IP address must be added to the Masters file, on the remote Gateways.
Which encryption scheme provides in-place encryption?
A. DES
B. SKIP
C. AES
D. IKE
Which of the following load-balancing methods is not valid?
A. Domain
B. They are all valid
C. Round trip
D. Random
You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of the following, which would be the best configuration to protect from a traffic hijack attempt?
A. Enable the Web intelligence > SQL injection setting.
B. Activate the Cross-Site Scripting property.
C. Configure TCP defenses such as Small PMTU size.
D. Create resource objects for the Web farm servers and configure rules for the Web farm.
The process _______ provides service to access the GAIA configuration database.
A. configdbd
B. confd
C. fwm
D. ipsrd
Which DLP action would describe the following action: The data transmission event is logged in SmartView Tracker. Administrators with permission can view the data that was sent. The traffic is passed.
A. Detect
B. Ask User
C. Inform User
D. Prevent