Which of the following statements are TRUE?
Typically, when you upgrade the Security Management Server, you install and configure a fresh R75 installation on a new computer and then migrate the database from the original machine.
Which of the following statements are TRUE?
When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
When doing this, what is required of the two machines? They must both have the same:
Typically, when you upgrade the Security Management Server, you install and configure a fresh R75 installation on a new computer and then migrate the database from the original machine. When doing this, what is required of the two machines? They must both have the same:
Which Security Server can perform authentication tasks, but CANNOT perform content security tasks?
Which Security Server can perform authentication tasks, but CANNOT perform content security tasks?
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?
What is the correct order of steps?
Your VPN Community includes three Security Gateways. Each Gateway has its own internal network defined as a VPN Domain. You must test the VPN-1 NGX routE. based VPN feature, without stopping the VPN. What is the correct order of steps?
When upgrading Check Point products in a distributed environment, in which order should you upgrade these comp
When upgrading Check Point products in a distributed environment, in which order should you upgrade these components?
1 GUI Client
2 Security Management Server
3 Security Gateway
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping J
Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?
When restoring a Security Management Server from a backup file, the restore package can be retrieved from whic
When restoring a Security Management Server from a backup file, the restore package can be retrieved from which source?
Which type of address translation should you use, to ensure the two networks access each other through the VPN
You want to create an IKE VPN between two VPN-1 NGX Security Gateways, to protect two networks. The network behind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind the peer’s Gateway. Which type of address translation should you use, to ensure the two networks access each other through the VPN tunnel?