How does ClusterXL Unicast mode handle new traffic?
How does ClusterXL Unicast mode handle new traffic?
what are Barak’s remaining steps?
Barak is a Security Administrator for an organization that has two sites using prE. shared secrets
in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is
opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three
Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security
Gateway. Barak decides to switch from prE. shared secrets to Certificates issued by the Internal
Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain,
what are Barak’s remaining steps?
1 .Disable “PrE. Shared Secret” on the London and Oslo gateway objects.
2.Add the Madrid gateway object into the Oslo and London’s mesh VPN Community.
3.Manually generate ICA Certificates for all three Security Gateways.
4.Configure “Traditional mode VPN configuration” in the Madrid gateway object’s VPN screen.
5.Reinstall the Security Policy on all three Security Gateways.
Which Check Point QoS feature allows a Security Administrator to define special classes of service for delay-s
Which Check Point QoS feature allows a Security Administrator to define special classes of
service for delay-sensitive applications?
How do you configure the FTP resource object and the action column in the rule to achieve this goal?
You have an internal FTP server, and you allow downloading, but not uploading. Assume Network
Address Translation is set up correctly, and you want to add an inbound rule with: Source: Any
Destination: FTP server Service: an FTP resource object.
How do you configure the FTP resource object and the action column in the rule to achieve this
goal?
For your cluster, you plan to use three machines with the following configurations:Are these machines correctl
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use
three machines with the following configurations:Are these machines correctly configured for a
ClusterXL deployment?
Which of the following might improve throughput performance?
Damon enables an SMTP resource for content protection. He notices that mail seems to slow
down on occasion, sometimes being delivered late. Which of the following might improve
throughput performance?
what percent of bandwidth will be allocated to the HTTP traffic?
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and
the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP
traffic, what percent of bandwidth will be allocated to the HTTP traffic?
what percent of bandwidth will be allocated to the HTTP traffic?
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and
the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP
traffic, what percent of bandwidth will be allocated to the HTTP traffic?
Which of the following actions is most likely to improve the performance of Check Point QoS?
Which of the following actions is most likely to improve the performance of Check Point QoS?
Which of the following is a possible cause?
Robert has configured a Common Internet File System (CIFS) resource to allow access to the
public partition of his company’s file server, on \\erisco\goldenapple\files\public. Robert receives
reports that users are unable to access the shared partition, unless they use the file server’s IP
address. Which of the following is a possible cause?