Which component functions as the Internal Certificate Authority for VPN-1 NGX?


Which component functions as the Internal Certificate Authority for VPN-1 NGX?

Which machine has the highest priority?

The following is cphaprob state command output from a New Mode High Availability cluster member. exhibit Which machine has the highest priority?

Which operating system is NOT supported by VPN-1 SecureClient?

Which operating system is NOT supported by VPN-1 SecureClient?

How do you configure the new machine to be the standby SmartCenter Server…

Your primary SmartCenter Server is installed on a SecurePlatform Pro machine, which is also a VPN-1 Pro Gateway. You want to implement Management High Availability (HA). You have a spare machine to configure as the secondary SmartCenter Server. How do you configure the new machine to be the […]

What is the problem?

Steve tries to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. Steve sees the following screen.exhibit What is the problem?


Which of the following options will allow Rachel to control which FTP commands pass through…

Rachel is the Security Administrator for a university. The university’s FTP servers have old hardware and software. Certain FTP commands cause the FTP servers to malfunction.Upgrading the FTP servers is not an option at this time. Which of the following options will allow Rachel to control […]

How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A…

How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_A to end point Net_B, through an NGX Security Gateway?

How is the Security Gateway VPN Domain created?

The following diagram illustrates how a VPN-1 SecureClient user tries to establish a VPN with hosts in the external_net and internal_net from the Internet. exhibit How is the Security Gateway VPN Domain created?

Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?

Which machine meets ALL of the following requirements?

You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NGX. You have five systems to choose from for the new Gateway, and you must conform to the following requirements:Operating-system vendor’s license agreementCheck Point’s license agreementMinimum operating-system hardware […]

Page 3 of 2212345...1020...Last »