which of the following systems is the BEST choice?
You a preparing to deploy a new VPN-1/FireWall-1 Enforcement Module. You have five systems
to choose from for your new Enforcement Module and you must meet the following requirements:
Comply with the operating system vendor’s license agreement.Comply with Check Point’s license
agreement.Install the Enforcement Module on a supported operating system.Meet minimum
hardware specifications for the operating system.Meet minimum hardware specifications for the
VPN-1/FireWall-1 Enforcement Module.
Based on the above specifications, which of the following systems is the BEST choice?
Which of the following actions should be taken before deploying VPN-1/FireWall-1 in a production role?
Which of the following actions should be taken before deploying VPN-1/FireWall-1 in a production
role? (Choose three)
Which technology should Dr Billexplain to the executives?
Dr Billis a Security Administrator whose organization maintains several IKE VPNs. Executives in
Dr King’s organization want to known which mechanism VPN-1/FireWall-1 uses to guarantee the
authenticity of messages. Which technology should Dr Billexplain to the executives?
Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gatekeeper object that supports Q.931
Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gatekeeper object that
supports Q.931 and H.245.
Which of the following statements is TRUE of Dr King’s testing and conclusion?
Dr Billis assisting a SecureClient user, who cannot access resources in the VPN Domain. Dr
Billhas performed the following troubleshooting tasks.
Confirmed that the Network Interface Card, Ethernet cable, and router port are all functioning
properly.Reviewed the contents of the SecureClient machine’s Address Resolution Protocol table,
and confirmed entries are consistent with the machine addresses of other machines in the collision
domain.Used Ping, to confirm connectivity with the default gateway and upstream
router.Completed an FTP session to an Internet host.Tried to Telnet to a host in the VPN Domain,
this attempt failed.
Dr Billconcluded the problem is a SecureClient problem, and not a TCP/IP connectivity issue.
Which of the following statements is TRUE of Dr King’s testing and conclusion?
Which of the following should you do first?
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an
external partner. Which of the following should you do first?
How does load balancing allow several servers to share and distribute the network load in the VPN-1/FireWall-1
How does load balancing allow several servers to share and distribute the network load in the
VPN-1/FireWall-1 software?
Which of the following are credentials supported by VPN-1/FireWall-1 for a gateway-to-gateway encryption?
In gateway-to-gateway encryption, gateways identify themselves by presenting their credentials.
Which of the following are credentials supported by VPN-1/FireWall-1 for a gateway-to-gateway
encryption? (Choose two)
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?
Dr Billis a Security Administrator preparing to implement a VPN solution for his multisite
organization. To comply with industry regulations, Dr King’s VPN solution must meet the following
requirements:
Portability: StandardKey Management: Automatic, External PKISession Keys: Changed at
configured times during a connection’s lifetimeKey Length: No less than 128 bitData Integrity:
Secure against brute force and inversion attacks
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?
Which of the following is NOT true?
Dr Billis a Security Administrator configuring SecuRemote as a remote-access solution for his
company. Which of the following is NOT true?
Dr BillMUST: