What is the maximum number of cores supported by CoreXL?
What is the maximum number of cores supported by CoreXL?
Which Check Point QoS feature allows a Security Administrator to define special classes of service for delay-s
Which Check Point QoS feature allows a Security Administrator to define special classes of
service for delay-sensitive applications?
Which statement is TRUE for route-based VPNs?
Which statement is TRUE for route-based VPNs?
Which operating system(s) support(s) unnumbered VPN Tunnel Interfaces (VTIs) for route-based VPNs?
Which operating system(s) support(s) unnumbered VPN Tunnel Interfaces (VTIs) for route-based
VPNs?
Which of the following items can be provisioned via a Profile through SmartProvisioning?
Which of the following items can be provisioned via a Profile through SmartProvisioning?
i) Backup Schedule
ii) DNS Entries
iii) Hosts Table
iv) Domain Name
v) Interface IP’s
What does it mean when a Security Gateway is labeled Untrusted in the SmartProvisioning Status view?
What does it mean when a Security Gateway is labeled Untrusted in the SmartProvisioning Status
view?
what targets are available?
Using the Backup Target functionality in SmartProvisioning, what targets are available?
i) FTP
ii) TFTP
iii) SFTP
iv) SCP
v) Locally
Click on the Profiles Tab
The We-Make-Widgets company has purchased twenty UTM-1 Edge appliances for their remote
offices. Kim decides the best way to manage those appliances is to use SmartProvisioning and
create a profile they can all use. List the order of steps Kim would go through to add the Dallas
Edge appliance to the Remote Office profile using the output below.
1. Enter the name of the profile called “Remote Offices”
2. Change the provisioning profile to “Remote Offices”
3. Click File, then select New, then Provisioning Profile
4. Click on the Devices Tab
5. Highlight the Dallas Edge appliance, click Edit, then edit Gateway
6. Click on the Profiles Tab
which of the following?
SmartProvisioning can provision the Operating System and network settings on which of the
following?
Which of the following load-balancing methods is not valid?
Which of the following load-balancing methods is not valid?