
CHKP2 - 51 to 100
Authored by Joder Lapolla
Computers
1st Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which two Cluster Solutions are available under R81.10?
ClusterXL and NSRP
VRRP and HSRP
VRRP and IP Clustering
ClusterXL and VRRP
2.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?
Each network environment is dependent and includes interfaces, routes, sockets, and processes
Management Plane – To access, provision and monitor the Security Gateway
Data Plane – To access, provision and monitor the Security Gateway
Management Plane – for all other network traffic and processing
3.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
The URL and server certificate are sent to the Check Point Online Web Service.
The full URL, including page data, is sent to the Check Point Online Web Service.
The host part of the URL is sent to the Check Point Online Web Service.
The URL and IP address are sent to the Check Point Online Web Service.
4.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
Involved traffic logs will be forwarded to a log server.
Provides log details view email to the Administrator.
Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.
Provides additional information to the connected user.
5.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
To increase security, the administrator has modified the Core protection 'Host Port Scan' from 'Medium' to 'High' Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
The Access Control and Threat Prevention Policies.
The Access Control Policy.
The Access Control & HTTPS Inspection Policy.
The Threat Prevention Policy.
6.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which Check Point process provides logging services, such as forwarding logs from Gateway to Log Server providing Log Export API (LEA) & Event Logging API (ELA) services?
DASSERVICE
FWD
CPVIEWD
CPD
7.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?
The corresponding feature is new to R81.10 and is called "Management Data Plane Separation"
The corresponding feature is called "Dynamic Dispatching"
There is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing
The corresponding feature is called "Dynamic Split"
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?