Which application is used to create a File-Share Application?
Which application is used to create a File-Share Application?
The default track column of the newly created Default rule is set to:
Which of the following is not a possible cause of this?
How would you characterize this attack tool? Give the BEST answer.
Which of the following question(s) will you raise when planning a VPN topology?
Which of the following question(s) will you raise when planning a VPN topology?
1. Who needs secure/private access?
2. From a VPN point of view, what will be the structure of the organization?
3. Internally managed gateways will authenticate each other using certificates
4. How will externally managed gateways authenticate
5. What VPN topology will be suitable?
By default Check Point High Availability components send updates about their state every:
By default Check Point High Availability components send updates about their state every:
How would you configure this in the IPS tab?
You need to determine if your company’s Web servers are accessed an excessive number of times from the same host. How would you configure this in the IPS tab?
Which of the following are the disadvantages of symmetric encryption?
Which of the following are the disadvantages of symmetric encryption?
Which machine has the highest priority?
Of the following, which would be the best configuration to protect from a traffic hijack attempt?
You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of the following, which would be the best configuration to protect from a traffic hijack attempt?




