Which load-balancing method below is NOT valid?
Which load-balancing method below is NOT valid?
Which method of load balancing describes “Round Robin”?
Which method of load balancing describes “Round Robin”?
Is State Synchronization working properly between the two members?
State Synchronization is enabled on both members in a cluster, and the Security Policy is
successfully installed. No protocols or services have been unselected for selective sync.
Review the fw tab -t connections -s output from both members. Is State Synchronization working
properly between the two members?
What is the correct upgrade procedure?
You want to upgrade a cluster with two members to R77. The Security Management Server and
both members are version NGX R65, with the latest Hotfix Accumulator. What is the correct
upgrade procedure?
1. Change the version in the General Properties of the Gateway-cluster object.
2. Upgrade the Security Management Server, and reboot.
3. Run cpstop on one member, while leaving the other member running. Upgrade one member at
a time and reboot after upgrade.
4. Install the Security Policy.
Which of the following answers does NOT lead to a successful solution?
Included in the client’s network are some switches, which rely on IGMP snooping. You must find a
solution to work with these switches. Which of the following answers does NOT lead to a
successful solution?
Is it possible to install a cluster in this situation?
The customer wishes to install a cluster. In his network, there is a switch which is incapable of
forwarding multicast. Is it possible to install a cluster in this situation?
What could be a reason why synchronization between primary and secondary Security Management Servers does not
What could be a reason why synchronization between primary and secondary Security
Management Servers does not occur?
What is the proper command for importing users into the R77 User Database?
What is the proper command for importing users into the R77 User Database?
Select the BEST response for the synchronization trigger.
In a R75 Management High Availability (HA) configuration, you can configure synchronization to
occur automatically, when:
1. The Security Policy is installed.
2. The Security Policy is saved.
3. The Security Administrator logs in to the seconday Security Management Server and changes
its status to Active.
4. A scheduled event occurs.
5. The user data base is installed.
Select the BEST response for the synchronization trigger.
What is a requirement for setting up R77 Management High Availability?
What is a requirement for setting up R77 Management High Availability?