chekpoint 41-80

chekpoint 41-80

1st Grade

40 Qs

quiz-placeholder

Similar activities

Administrasi Infrastruktur Jaringan

Administrasi Infrastruktur Jaringan

1st Grade

40 Qs

CHKP 301 - 341

CHKP 301 - 341

1st Grade

44 Qs

Checkpoint 121-160

Checkpoint 121-160

1st Grade

40 Qs

IP Routing + OSPF

IP Routing + OSPF

1st - 12th Grade

40 Qs

ASJ - SSH dan Proxy

ASJ - SSH dan Proxy

1st Grade

40 Qs

Sidharth Day 3 Quiz

Sidharth Day 3 Quiz

KG - Professional Development

40 Qs

Teknologi Layanan Jaringan XII

Teknologi Layanan Jaringan XII

1st Grade

35 Qs

Final Questions

Final Questions

1st Grade

40 Qs

chekpoint 41-80

chekpoint 41-80

Assessment

Quiz

Computers

1st Grade

Easy

Created by

. .

Used 40+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In R80, Unified Policy is a combination of
Access control policy, QoS Policy, Desktop Security Policy and endpoint policy
Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy
Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
Access control policy, QoS Policy, Desktop Security Policy and VPN policy.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.

upgrade_import

cpconfig

fwm dbimport -p

cpinfo -recover

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image
What does ExternalZone represent in the presented rule?

The Internet

Interfaces that administrator has defined to be part of External Security Zone.

External interfaces on all security gateways.

External interfaces of specific gateways.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
User data base corruption
LDAP conflicts
Traffic issues
Phase two key negotiation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image
View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer

The current administrator has read-only permissions to Threat Prevention Policy.

Another user has locked the rule for editing

Configuration lock is present. Click the lock symbol to gain read-write access.

The current administrator is logged in as read-only because someone else is editing the policy.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When attempting to start a VPN tunnel, in the logs the error 'no proposal chosen' is seen numerous times. No other VPN-related log entries are present. Which phase of the VPN negotiations has failed?
IKE Phase 1
IPSEC Phase 2
IPSEC Phase 1
IKE Phase 2

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which command is used to add users to or from existing roles?
Add rba user roles
Add rba user
Add user roles
Add user

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?