Where do you enable popup alerts for SmartDefense settings that have detected suspicious activity?
Where do you enable popup alerts for SmartDefense settings that have detected suspicious
activity?
A . In SmartView Monitor, select Tools > Alerts
B . In SmartView Tracker, select Tools > Custom Commands
What is the problem and how do you make the VPN to use the VTI tunnels?
You have three Gateways in a mesh community. Each gateway’s VPN Domain is their internal
network as defined on the Topology tab setting “All IP Addresses behind Gateway based on
Topology information.” You want to test the route-based VPN, so you created VTIs among the
Gateways and created static route entries for the VTIs. However, when you test the VPN, you find
out the VPN still go through the regular domain IPSec tunnels instead of the routed VTI tunnels.
What is the problem and how do you make the VPN to use the VTI tunnels?
Are these machines correctly configured for a ClusterXL deployment?
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use
four machines with the following configurations: Cluster Member 1: OS: SecurePlatform, NICs:
QuadCard, memory: 512 MB, Security Gateway only, and version: VPN-1 NGX R65
Cluster Member 2: OS: SecurePlatform, NICs: 4 Intel 3Com, memory: 512 MB, Security Gateway
only, and version: VPN-1 NGX R65 Cluster Member 3: OS: SecurePlatform, NICs: 4 other
manufacturers, memory: 256 MB, Security Gateway only, and version: VPN-1 NGX R65
SmartCenter Server: MS Windows 2000, NIC: Intel NIC (1), Security Gateway and primary
SmartCenter Server installed, version: VPN-1 NGX R65 Are these machines correctly configured
for a ClusterXL deployment?
What is a Consolidation Policy?
What is a Consolidation Policy?
What port is used for communication to the User Center with SmartUpdate?
What port is used for communication to the User Center with SmartUpdate?
Which VPN-1 NGX R65 component displays the number of packets accepted, rejected, and dropped on a specific Sec
Which VPN-1 NGX R65 component displays the number of packets accepted, rejected, and
dropped on a specific Security Gateway, in real time?
Which command line interface utility allows the administrator to verify the name and timestamp of the Security
Which command line interface utility allows the administrator to verify the name and timestamp of
the Security Policy currently installed on a firewall module?
which of the following should you check?
If you are experiencing LDAP issues, which of the following should you check?
which two layers of the OSI model?
The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of
the OSI model?
Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?
Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?