When using LDAP as an authentication method for Identity Awareness, the query:
When using LDAP as an authentication method for Identity Awareness, the query:
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting P
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?
What action can be performed from SmartUpdate R77?
What action can be performed from SmartUpdate R77?
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner si
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
Choose the SmartLog property that is TRUE.
Choose the SmartLog property that is TRUE.
Which directory holds the SmartLog index files by default?
Which directory holds the SmartLog index files by default?
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
Which of the following is NOT defined by an Access Role object?
Which of the following is NOT defined by an Access Role object?
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP addr
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?