How can she resolve this problem without causing other security issues?

ASecurity Administrator is notified that some longlasting Telnet connections to a mainframe are dropped every time after an hour. The Administrator suspect that the the Security Gateway might be blocking these connections. As she reviews the Smart Tracker the Administrator sees the packet is […]

How could she use SmartView Monitor to find this information?

Amanda is compiling traffic statistics for TestKing.com’s Internet activity during production hours. How could she use SmartView Monitor to find this information? By

What must John do, to ensure implied rules meet the new requirement?

John is the Security Administrator for a public hospital. New healthcare legislation requires logging for all traffic accepted through the perimeter Security Gateway.What must John do, to ensure implied rules meet the new requirement?

Which of the following is a possible cause for the connection problem?

Frank wants to know why users on the corporate network cannot receive multicast transmissions from the Internet. An NGX Security Gateway protects the corporate network fromt he Internet Which of the following is a possible cause for the connection problem?

what does this command allow you to upgrade?

You are running a VPN1 NG with Application Intelligence R54 SecurePlatform VPN1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?

Which Check Point QoS feature issued to dynamically allocate relative portions of available bandwidth?

Which Check Point QoS feature issued to dynamically allocate relative portions of available bandwidth?

Which operating system is not supported byVPN1 SecureClient?

Which operating system is not supported byVPN1 SecureClient?

Which SmartConsole application should Ben Use to answer this question?

Ben is the security administrator for a university. Ben configured and installed a new Security Policy this morning. An hour after installing the new security policy.Ben began receiving complaints that internet access was very slow. Ben called his internet Server Provider , who asked Ben how […]

Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current lKE Phase 1 and Phase 2 keys.Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

which of the following should you check?

If you are experiencing LDAP issues, which of the following should you check?

Page 3 of 812345...Last »