Which of the following methods will provide the most complete backup of an R77 configuration?
Answer : C
Where can an administrator specify the notification action to be taken by the firewall in the event that available disk space drops below 15%?
Answer : C
Where can an administrator configure the notification action in the event of a policy install time change?
Answer : A
You have created a Rule Base for firewall, websydney. Now you are going to create a new policy package with security and address translation rules for a second Gateway. What is
TRUE about the new packages NAT rules?
Exhibit:
Answer : A
Answer : B
Which of these Security Policy changes optimize Security Gateway performance?
Answer : B
Which SmartView Tracker selection would most effectively show who installed a Security
Policy blocking all traffic from the corporate network?
Answer : A
Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT.
You also have a small network 10.10.20.0/24 behind the internal router. You want to configure the kernel to translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP, and FTP services. Which of the following configurations will allow this network to access the Internet?
Answer : C
When launching SmartDashboard, what information is required to log into R77?
Answer : B
What is the default setting when you use NAT?
Answer : B
After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection point. Which is the likely source of the issue?
Answer : D
Which of the following R77 SmartView Tracker views will display a popup warning about performance implications on the Security Gateway?
Answer : C
Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?
Answer : B
You are the Security Administrator for ABC-Corp. A Check Point Firewall is installed and in
Answer : A
Which of the following statements BEST describes Check Points Hide Network Address
Translation method?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us