What is the most appropriate setting Yoav should choose?
Yoav is a Security Administrator preparing to implement a VPN solution for his multi-site organization. To comply with industry regulations, Yoav’s VPN solution must meet the following requirements:
Portability: Standard
Key management: Automatic, external PKI
Session keys: Changed at configured times during a connection’s lifetime Key length: No less than 128-bit Data integrity: Secure against inversion and brute-force attacks
What is the most appropriate setting Yoav should choose?
Which operating system is NOT supported by VPN-1 SecureClient?
Which operating system is NOT supported by VPN-1 SecureClient?
What is the BEST configuration for VPN Communities among the branch offices and their headquarters, and betwee
Your company has two headquarters, one in London, one in New York.
Each headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and only the headquarters need to communicate directly. What is the BEST configuration for VPN Communities among the branch offices and their headquarters, and between the two headquarters? VPN Communities comprised of:
Which of the following is the most efficient configuration method?
Cody is notified by blacklist.org that his site has been reported as a spam
relay, due to his SMTP Server being unprotected. Cody decides to implement an SMTP Security Server, to prevent the server from being a spam relay. Which of the following is the most efficient configuration method?
which FTP commands pass through the Security Gateway protecting the FTP servers?
Rachel is the Security Administrator for a university. The university’s FTP servers have old hardware and software. Certain FTP commands cause the FTP servers to malfunction.
Upgrading the FTP servers is not an option at this time. Which of the following options will allow Rachel to control which FTP commands pass through the Security Gateway protecting the FTP servers?
How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A to end point Net
How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A to end point Net_B, through an NGX Security Gateway?
Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?
Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?
which of the following statements is true?
You configure a Check Point QoS Rule Base with two rules: an H.323 rule with a weight of 10, and the Default Rule with a weight of 10. The H.323 rule includes a per-connection guarantee of 384 Kbps, and a per-connection limit of 512 Kbps. The per-connection guarantee is for four connections, and no additional connections are allowed in the Action properties. If traffic passing through the QoS Module matches both rules, which of the following statements is true?
Which Check Point QoS feature is used to dynamically allocate relative portions of available bandwidth?
Which Check Point QoS feature is used to dynamically allocate relative portions of available bandwidth?
which environment?
VPN-1 NGX supports VoIP traffic in all of the following environments, EXCEPT which environment?