Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

Correct Answer for the Question – Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)? is given below Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/htmLframeset.htm?topic=documents/R77/CP_R77_VPN_AdminGuide/13847 AES-GCM-256 AES-CBC-256 AES-GCM-128 Correct Answer The Correct Answer for this Question is … Read more

Which of the following should you remember?

Correct Answer for the Question – Which of the following should you remember? is given below The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?Security Server. You can only use the rule for Telnet, FTP, SMPT, and rlogin … Read more

The Firewall kernel is replicated multiple times, therefore:

Correct Answer for the Question – The Firewall kernel is replicated multiple times, therefore: is given below The Firewall kernel is replicated multiple times, therefore: The Firewall kernel only touches the packet if the connection is accelerated The Firewall can run different policies per core The Firewall kernel is replicated only with new connections and deletes … Read more

Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?

Correct Answer for the Question – Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management? is given below Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management? Microsoft Publisher JSON … Read more

What is the purpose of a Stealth Rule?

Correct Answer for the Question – What is the purpose of a Stealth Rule? is given below What is the purpose of a Stealth Rule?Reference: http://www.pearsonitcertification.com/articles/article.aspx?p=387728&seqNum=3 A rule used to hide a server’s IP address from the outside world. A rule that allows administrators to access SmartDashboard from any device. To drop any traffic destined for … Read more

Which of the following is NOT a valid configuration screen of an Access Role Object?

Correct Answer for the Question – Which of the following is NOT a valid configuration screen of an Access Role Object? is given below Which of the following is NOT a valid configuration screen of an Access Role Object?Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62050.htm Users Networks Time Machines Correct Answer The Correct Answer for this Question is Time Explanation The … Read more

In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

Correct Answer for the Question – In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway is given below In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway True, CLI is the preferred method for Licensing False, Central Licenses are handled via Security … Read more

How do you manage Gaia?

Correct Answer for the Question – How do you manage Gaia? is given below How do you manage Gaia? Through CLI and WebUI Through CLI only Through SmartDashboard only Through CLI, WebUI, and SmartDashboard Correct Answer The Correct Answer for this Question is Through CLI, WebUI, and SmartDashboard Explanation The Question – How do you manage … Read more

Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?

Correct Answer for the Question – Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule? is given below Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule? All Site-to-Site VPN Communities Accept all encrypted traffic All Connections (Clear or Encrypted) … Read more

What licensing feature automatically verifies current licenses and activates new licenses added to the License and Contracts repository?

Correct Answer for the Question – What licensing feature automatically verifies current licenses and activates new licenses added to the License and Contracts repository? is given below What licensing feature automatically verifies current licenses and activates new licenses added to the License and Contracts repository? Verification tool Verification licensing Automatic licensing Automatic licensing and Verification tool … Read more