Which of the following access options would you NOT use when configuring Captive Portal?
A. Through the Firewall policy
B. From the Internet
C. Through all interfaces
D. Through internal interfaces
The User Directory Software Blade is used to integrate which of the following with aR76Security Gateway?
A. LDAP server
B. RADIUS server
C. Account Management Client server
D. User Authorityserver
Which command would you use to save the routing information before upgrading a Windows Gateway?
A. ipconfig –a > [filename].txt
B. ifconfig > [filename].txt
C. cp /etc/sysconfig/network.C [location]
D. netstat -m > [filename].txt
Check Point support has asked Tony for a firewall capture of accepted packets. What would be the correct syntax to create a capture file to a filename calledmonitor. out?
A. Run fw monitor -e "accept;" -f monitor.out
B. Run fw monitor -e "accept;" -c monitor.out
C. Run fw monitor -e "accept;" -o monitor.out
D. Run fw monitor -e "accept;" -m monitor.out
Your network includes ClusterXL running Multicast mode on two members, as shown in this topology: Your network is expanding, and you need to add new interfaces:
10.10.10.1/24 on Member A, and 10.10.10.2/24 on Member B. The virtual IP address for interface 10.10.10.0/24 is 10.10.10.3.
What is the correct procedure to add these interfaces?
A. 1. Use the ifconfig command to configure and enable the new interface.
2.
Run cpstop and cpstart on both members at the same time.
3.
Update the topology in the cluster object for the cluster and both members.
4.
Install the Security Policy.
B. 1. Disable "Cluster membership" from one Gateway via cpconfig.
2.
Configure the new interface via sysconfig from the "non-member" Gateway.
3.
RE. enable "Cluster membership" on the Gateway.
4.
Perform the same step on the other Gateway.
5.
Update the topology in the cluster object for the cluster and members.
6.
Install the Security Policy.
C. 1. Run cpstop on one member, and configure the new interface via sysconfig.
2.
Run cpstart on the member. Repeat the same steps on another member.
3.
Update the new topology in the cluster object for the cluster and members.
4.
Install the Security Policy.
D. 1. Use sysconfig to configure the new interfaces on both members.
2.
Update the topology in the cluster object for the cluster and both members.
3.
Install the Security Policy.
Which Check Point QoS feature marks the ToS byte in the IP header?
A. Differentiated Services
B. Guarantees
C. Weighted Fair Queuing
D. Low Latency Queuing
The following diagram illustrates how a VPN-1 SecureClient user tries to establish a VPN with hosts in the external_net and internal_net from the Internet. How is the Security Gateway VPN Domain created?
A. Internal Gateway VPN Domain = internal_net; External VPN Domain = external net + external gateway object + internal_net.
B. Internal Gateway VPN Domain = internal_net. External Gateway VPN Domain = external_net + internal gateway object
C. Internal Gateway VPN Domain = internal_net; External Gateway VPN Domain = internal_net + external_net
D. Internal Gateway VPN Domain = internal_net. External Gateway VPN Domain = internal VPN Domain + internal gateway object + external_net
Which statement is TRUE for route-based VPNs?
A. Route-based VPNs replace domain-based VPNs.
B. Route-based VPNs are a form of partial overlap VPN Domain.
C. IP Pool NAT must be configured on each gateway.
D. Dynamic-routing protocols are not required.
Where do Gateways managed bySmart Provisioningfetch their assigned profiles?
A. TheSmart viewMonitor
B. The standaloneSmart Provisioningserver
C. The Security Management server or CMA
D. They are fetched locally from the individual device
Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.
A. cphaprob -ia list
B.
C.
D.