What is the correct procedure?

You have a production implementation of Management High Availability, at version VPN-1 NG with Application Intelligence R55. You must upgrade your two SmartCenter Servers to VPN-1 NGX. What is the correct procedure?

Which of the following services is NOT provided by a CIFS resource?

VPN-1 NGX includes a resource mechanism for working with the Common Internet File System (CIFS). However, this service only provides a limited level of actions for CIFS security. Which of the following services is NOT provided by a CIFS resource?


What causes the Connection Rejection?

You are reviewing SmartView Tracker entries, and see a Connection Rejection on a Check Point QoS rule. What causes the Connection Rejection?

Where can a Security Administrator adjust the unit of measurement (bps, Kbps or Bps), for Check Point QoS bandwidth?

Where can a Security Administrator adjust the unit of measurement (bps, Kbps or Bps), for Check Point QoS bandwidth?

Which of the following actions is most likely to improve the performance of Check Point QoS?

Which of the following actions is most likely to improve the performance of Check Point QoS?

How do you configure the FTP resource object and the action column in the rule to achieve this goal?

You have an internal FTP server, and you allow downloading, but not uploading. Assume Network Address Translation is set up correctly, and you want to add an inbound rule with: Source: Any Destination: FTP server Service: an FTP resource object.How do you configure the FTP resource object and […]

What is the most appropriate setting Yoav should choose?

Yoav is a Security Administrator preparing to implement a VPN solution for his multi-site organization. To comply with industry regulations, Yoav’s VPN solution must meet the following requirements:Portability: StandardKey management: Automatic, external PKISession keys: Changed at configured […]

Which of the following is the most efficient configuration method?

Cody is notified by blacklist.org that his site has been reported as a spamrelay, due to his SMTP Server being unprotected. Cody decides to implement an SMTP Security Server, to prevent the server from being a spam relay. Which of the following is the most efficient configuration method?

Which Check Point QoS feature marks the Type of Service (ToS) byte in the IP header?

Which Check Point QoS feature marks the Type of Service (ToS) byte in the IP header?

What is the BEST configuration for VPN Communities among the branch offices …

Your company has two headquarters, one in London, one in New York.Each headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and only the headquarters need to communicate directly. What is the BEST […]

Page 10 of 22« First...89101112...20...Last »