You a preparing to deploy a new VPN-1/FireWall-1 Enforcement Module. You have five systems
to choose from for your new Enforcement Module and you must meet the following requirements:
Comply with the operating system vendor’s license agreement.Comply with Check Point’s license
agreement.Install the Enforcement Module on a supported operating system.Meet minimum
hardware specifications for the operating system.Meet minimum hardware specifications for the
VPN-1/FireWall-1 Enforcement Module.
Based on the above specifications, which of the following systems is the BEST choice?
Which of the following actions should be taken before deploying VPN-1/FireWall-1 in a production
role? (Choose three)
Dr Billis a Security Administrator whose organization maintains several IKE VPNs. Executives in
Dr King’s organization want to known which mechanism VPN-1/FireWall-1 uses to guarantee the
authenticity of messages. Which technology should Dr Billexplain to the executives?
Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gatekeeper object that
supports Q.931 and H.245.
Dr Billis assisting a SecureClient user, who cannot access resources in the VPN Domain. Dr
Billhas performed the following troubleshooting tasks.
Confirmed that the Network Interface Card, Ethernet cable, and router port are all functioning
properly.Reviewed the contents of the SecureClient machine’s Address Resolution Protocol table,
and confirmed entries are consistent with the machine addresses of other machines in the collision
domain.Used Ping, to confirm connectivity with the default gateway and upstream
router.Completed an FTP session to an Internet host.Tried to Telnet to a host in the VPN Domain,
this attempt failed.
Dr Billconcluded the problem is a SecureClient problem, and not a TCP/IP connectivity issue.
Which of the following statements is TRUE of Dr King’s testing and conclusion?
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an
external partner. Which of the following should you do first?
How does load balancing allow several servers to share and distribute the network load in the
In gateway-to-gateway encryption, gateways identify themselves by presenting their credentials.
Which of the following are credentials supported by VPN-1/FireWall-1 for a gateway-to-gateway
encryption? (Choose two)
Dr Billis a Security Administrator preparing to implement a VPN solution for his multisite
organization. To comply with industry regulations, Dr King’s VPN solution must meet the following
Portability: StandardKey Management: Automatic, External PKISession Keys: Changed at
configured times during a connection’s lifetimeKey Length: No less than 128 bitData Integrity:
Secure against brute force and inversion attacks
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?
Dr Billis a Security Administrator configuring SecuRemote as a remote-access solution for his
company. Which of the following is NOT true?