Choose what BEST describes the following scenario, wher…
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe
logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged
in:
Which policy type is used to enforce bandwidth and traf…
Which policy type is used to enforce bandwidth and traffic control rules?
Fill in the blank: Once a license is activated, a _____…
Fill in the blank: Once a license is activated, a ________ should be installed.
Fill in the blanks: A Check Point software license cons…
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
Which of the following is NOT an element of VPN Simplif…
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
which of the following tools?
In order to modify Security Policies the administrator can use which of the following tools? Select the BEST
answer.
Select the BEST answer.
After the initial installation the First Time Configuration Wizard should be run. Select the BEST answer.
When it re-joins the cluster, will it become active aut…
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The
cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to
have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was
standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an
hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the cluster, will it
become active automatically?
Fill in the blanks: The Application Layer Firewalls ins…
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ________ layer(s) of the TCP/IPmodel and up to and including the ________ layer.
Which type of Endpoint Identity Agent includes packet t…
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?