What is the most appropriate setting Yoav should choose?


Yoav is a Security Administrator preparing to implement a VPN solution for his multi-site organization. To comply with industry regulations, Yoav’s VPN solution must meet the following requirements:Portability: StandardKey management: Automatic, external PKISession keys: Changed at configured […]

Which operating system is NOT supported by VPN-1 SecureClient?

Which operating system is NOT supported by VPN-1 SecureClient?

What is the BEST configuration for VPN Communities among the branch offices and their headquarters, and between the two headquarters?

Your company has two headquarters, one in London, one in New York.Each headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and only the headquarters need to communicate directly. What is the BEST […]

Which of the following is the most efficient configuration method?

Cody is notified by blacklist.org that his site has been reported as a spamrelay, due to his SMTP Server being unprotected. Cody decides to implement an SMTP Security Server, to prevent the server from being a spam relay. Which of the following is the most efficient configuration method?

which FTP commands pass through the Security Gateway protecting the FTP servers?

Rachel is the Security Administrator for a university. The university’s FTP servers have old hardware and software. Certain FTP commands cause the FTP servers to malfunction.Upgrading the FTP servers is not an option at this time. Which of the following options will allow Rachel to control […]


How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A to end point Net_B, through an NGX Security Gateway?

How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A to end point Net_B, through an NGX Security Gateway?

Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?

which of the following statements is true?

You configure a Check Point QoS Rule Base with two rules: an H.323 rule with a weight of 10, and the Default Rule with a weight of 10. The H.323 rule includes a per-connection guarantee of 384 Kbps, and a per-connection limit of 512 Kbps. The per-connection guarantee is for four connections, […]

Which Check Point QoS feature is used to dynamically allocate relative portions of available bandwidth?

Which Check Point QoS feature is used to dynamically allocate relative portions of available bandwidth?

which environment?

VPN-1 NGX supports VoIP traffic in all of the following environments, EXCEPT which environment?



Page 20 of 22« First...10...1819202122