Search Header Logo

Checkpoint 81-120

Authored by . .

Computers

1st Grade

Used 41+ times

Checkpoint 81-120
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?

No, since “maintain current active cluster member” option on the cluster object properties is enabled by default
No, since “maintain current active cluster member” option is enabled by default on the Global Properties
Yes, since “Switch to higher priority cluster member” option on the cluster object properties is enabled by default
Yes, since “Switch to higher priority cluster member” option is enabled by default on the Global Properties

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After the initial installation the First Time Configuration Wizard should be run. Select the BEST answer.

First Time Configuration Wizard can be run from the Unified SmartConsole.
First Time Configuration Wizard can be run from the command line or from the WebUI.
First time Configuration Wizard can only be run from the WebUI
Connection to the internet is required before running the First Time Configuration wizard

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In order to modify Security Policies the administrator can use which of the following tools? Select the BEST answer.

Command line of the Security Management Server or mgmt_cli.exe on any Windows computer
SmartConsole and WebUI on the Security Management Server
mgmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server.
SmartConsole or mgmt_cli on any computer where SmartConsole is installed

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?

“Encrypt” action in the Rule Base
Permanent Tunnels
“VPN” column in the Rule Base
Configuration checkbox “Accept all encrypted traffic”

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blanks: A Check Point software license consists of a _______ and _______ .

Software container; software package
Software blade; software container
Software package; signature
Signature; software blade

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blank: Once a license is activated, a ________ should be installed

License Management file
Security Gateway Contract file
Service Contract file
License Contract file

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which policy type is used to enforce bandwidth and traffic control rules?

Threat Emulation
Access Control
QoS
Threat Prevention

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?