How is communication between different Check Point components secured in R80? As with all questions, select the BEST answer.
A. By using IPSEC
B. By using SIC
C. By using ICA
D. By using 3DES
What is the default size of NAT table fwx_alloc?
A. 20000
B. 35000
C. 25000
D. 10000
Which one of the following is true about Threat Extraction?
A. Always delivers a file to user
B. Works on all MS Office, Executables, and PDF files
C. Can take up to 3 minutes to complete
D. Delivers file only if no threats found
Which tool is used to enable ClusterXL?
A. SmartUpdate
B. cpconfig
C. SmartConsole
D. sysconfig
When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to contuju'1* individual policies for each application?
A. Basic Approach
B. Strong Approach
C. Very Advanced Approach
D. Medium Approach
The "fw monitor" tool can be best used to troubleshoot _______________.
A. Logging issues
B. FWD issues
C. Network traffic issues
D. Authentication issues
Matt wants to upgrade his old Security Management Server to R80.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?
A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine
B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
C. Size of the $FWDIR/log folder of the target machine must be at least 25% of the size of the $FWDIR/ log directory on the source machine
D. Size of the /var/log folder of the target machine must be at least 25GB or more
In SmartConsole, where do you manage your Mobile Access Policy?
A. Access Control Policy
B. Through the Mobile Console
C. Shared Gateways Policy
D. From the Dedicated Mobility Tab
John is using Management HA. Which Security Management Server should he use for making changes?
A. secondary Smartcenter
B. active SmartConsole
C. connect virtual IP of Smartcenter HA
D. primary Log Server
In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:
A. Basic, Optimized, Strict
B. Basic, Optimized, Severe
C. General, Escalation, Severe
D. General, purposed, Strict