CHKP1 - 1 to 50

CHKP1 - 1 to 50

1st Grade

50 Qs

quiz-placeholder

Similar activities

People Management

People Management

KG - University

52 Qs

are you a no sabo kid?

are you a no sabo kid?

KG - Professional Development

48 Qs

Soaal kerajinan dan penggolahan 8

Soaal kerajinan dan penggolahan 8

1st Grade - Professional Development

50 Qs

Would You Rather

Would You Rather

KG - University

50 Qs

SOAL SISPRES TAHUN 2023

SOAL SISPRES TAHUN 2023

1st - 5th Grade

50 Qs

OPEN HOUSE QUIZ

OPEN HOUSE QUIZ

1st - 12th Grade

50 Qs

Tryout Sumative Akhir Jenjang SD

Tryout Sumative Akhir Jenjang SD

1st - 5th Grade

50 Qs

Soal Bank Umum Syariah

Soal Bank Umum Syariah

1st Grade

50 Qs

CHKP1 - 1 to 50

CHKP1 - 1 to 50

Assessment

Quiz

Other

1st Grade

Easy

Created by

Joder Lapolla

Used 8+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

Publish changes

Save changes

Install policy

Install database

2.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

Both License (.lic) and Contract (.xml) files

cp.macro

Contract file (.xml)

license File (.lic)

3.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which two Identity Awareness daemons are used to support identity sharing?

Policy Activation Point (PAP) and Policy Decision Point (PDP)

Policy Manipulation Point (PMP) and Policy Activation Point (PAP)

Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)

Policy Decision Point (PDP) and Policy Enforcement Point (PEP)

4.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

In which scenario will an administrator need to manually define Proxy ARP?

When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.

When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.

When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.

When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall's interfaces.

5.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

Centos Linux

Gaia embedded.

Gaia

Red Hat Enterprise Linux version

6.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

For Automatic Hide NAT rules created by the administrator what is a TRUE statement?

Source Port Address Translation (PAT) is enabled by default.

Automatic NAT rules are supported for Network objects only.

Automatic NAT rules are supported for Host objects only.

Source Port Address Translation (PAT) is disabled by default.

7.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

What technologies are used to deny or permit network traffic?

Stateful Inspection, Firewall Blade, and URL/Application Blade

Packet Filtering, Stateful Inspection, and Application Layer Firewall

Firewall Blade, URL/Application Blade, and IPS

Stateful Inspection, URL/Application Blade, and Threat Prevention

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?