SecuRemote operates between the _______and the ______.
SecuRemote operates between the _______and the ______.
where does VPN-1/Firewall-1 look for a user-defined tracking script?
By default where does VPN-1/Firewall-1 look for a user-defined tracking script?
Which parameter, of TRUE, will automatically initiate an RDP status query with a gateway to check if it is sti
Which parameter, of TRUE, will automatically initiate an RDP status query with a gateway to
check if it is still alive?
The Secure Client packaging tool installation generates a self-extracting auto-running executable file by savi
The Secure Client packaging tool installation generates a self-extracting auto-running executable
file by saving SecuRemote properties on the Management Server and applying the properties to
and open (unzipped) SecuRemote installation folder.
Certificates are possible when using ________.
You are a firewall administrator using SecuRemote. You are providing digital signatures to achieve
both data integrity checking and verification of sender. Certificates are possible when using
________.
These executables take the form of:
Some VPN-1/Firewall-1 tracking options generate log entries and trigger executables. These
executables take the form of:
Which of the following would you use?
You are using a 56-bit encryption key called DES. Your client is concerned that this is insufficient
security. You reconfigure the VPN to use the strongest encryption used by the VPN-1/Firewall-1
software. Which of the following would you use?
which workstations?
The functionality of the VPN-1/Firewall-1 architecture can be divided between which workstations?
Which if the following radio button options would you select from the Server Setup Properties window to config
You are working with a Windows NT server running the Check Point VPN-1/Firewall-1 software.
Which if the following radio button options would you select from the Server Setup Properties
window to configure the connect memory strategy for this configuration?
Respond to unauthenticated topology requests (IKE and FWI) on the Desktop Security screen in Global Properties
Respond to unauthenticated topology requests (IKE and FWI) on the Desktop Security screen in
Global Properties allow backward compatibility with earlier versions of the SecuRemote /Secure
Client.