Exam 3: Check Point Certified Security Expert - R80

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following links will take you to the SmartView web application?

(Multiple Choice)
4.7/5
(29)

What is the valid range for VRID value in VRRP configuration?

(Multiple Choice)
4.9/5
(39)

Which of the following authentication methods ARE NOT used for Mobile Access?

(Multiple Choice)
4.9/5
(31)

Which process handles connection from SmartConsole R80?

(Multiple Choice)
4.8/5
(31)

When users connect to the Mobile Access portal they are unable to open File Shares. Which log file would you want to examine?

(Multiple Choice)
4.8/5
(32)

You have pushed policy to GW-3 and now cannot pass traffic through the gateway. As a last resort, to restore traffic flow, what command would you run to remove the latest policy from GW-3?

(Multiple Choice)
4.8/5
(36)

Which Remote Access Client does not provide an Office-Mode Address?

(Multiple Choice)
4.9/5
(38)

What is the difference between SSL VPN and IPSec VPN?

(Multiple Choice)
4.9/5
(33)

What ports are used for SmartConsole to connect to the Security Management Server?

(Multiple Choice)
4.9/5
(42)

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

(Multiple Choice)
4.9/5
(31)

John detected high load on sync interface. Which is most recommended solution?

(Multiple Choice)
4.9/5
(41)

What is the most recommended way to install patches and hotfixes?

(Multiple Choice)
4.7/5
(42)

What is the command to check the status of Check Point processes?

(Multiple Choice)
4.8/5
(38)

Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?

(Multiple Choice)
4.9/5
(32)

What is the best method to upgrade a Security Management Server to R80.x when it is not connected to the Internet?

(Multiple Choice)
4.9/5
(36)

Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?

(Multiple Choice)
4.9/5
(29)

What is a best practice before starting to troubleshoot using the "fw monitor" tool?

(Multiple Choice)
4.8/5
(35)

If SecureXL is disabled which path is used to process traffic?

(Multiple Choice)
4.7/5
(33)

In which formats can Threat Emulation forensics reports be viewed in?

(Multiple Choice)
4.7/5
(43)

What has to be taken into consideration when configuring Management HA?

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 340
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)