Checkpoint 161-200

Checkpoint 161-200

1st Grade

40 Qs

quiz-placeholder

Similar activities

JavaScript - sprawdzian

JavaScript - sprawdzian

1st - 5th Grade

40 Qs

Quiz 1 Sistem Enterprise

Quiz 1 Sistem Enterprise

KG - 5th Grade

40 Qs

Computer revision

Computer revision

1st Grade

36 Qs

Python

Python

KG - Professional Development

35 Qs

Bab 1  : Perwakilan Data (ASK Tingkatan 2)

Bab 1 : Perwakilan Data (ASK Tingkatan 2)

1st - 5th Grade

43 Qs

Danganronpa Names

Danganronpa Names

KG - Professional Development

42 Qs

Excel podstawy

Excel podstawy

1st - 10th Grade

40 Qs

Egzamin EE 0.8 2020 styczeń

Egzamin EE 0.8 2020 styczeń

1st - 5th Grade

40 Qs

Checkpoint 161-200

Checkpoint 161-200

Assessment

Quiz

Computers

1st Grade

Practice Problem

Easy

Created by

. .

Used 43+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the correct statement regarding Implicit Rules

To edit the Implicit rules you go to: Launch Button > Policy > Global Properties > Firewall.
Implied rules are fixed rules that you cannot change.
You can directly edit the Implicit rules by double-clicking on a specific Implicit rule.
You can edit the Implicit rules but only if requested by Check Point support personnel.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why

You checked the cache password on desktop option in Global Properties
Another rule that accepts HTTP without authentication exists in the Rule Base.
You have forgotten to place the User Authentication Rule before the Stealth Rule.
Users must use the SecuRemote Client, to use the User Authentication Rule.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?

Run fwm dbexport -1 filename. Restore the database. Then, run fwm dbimport -1 filename to import the users.
Run fwm_dbexport to export the user database. Select restore the entire database in the Database Revision screen. Then, run fwm_dbimport
Restore the entire database, except the user database, and then create the new user and user group.
Restore the entire database, except the user database.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.

SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status
SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor
SmartView Tracker, CPINFO, SmartUpdate
Security Policy Editor, Log Viewer, Real Time Monitor GUI

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateway's VPN domain?

SNX modifies the routing table to forward VPN traffic to the Security Gateway.
An office mode address must be obtained by the client.
The SNX client application must be installed on the client.
Active-X must be allowed on the client.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?

FTP
SMTP
HTTP
RLOGIN

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?

External-user group
LDAP group
A group with a genetic user
All Users

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?