Category: 156-310.4

Exam 156-310.4: Check Point NG with
Application Intelligence – Management II CCSE

which of the following systems is the BEST choice?

You a preparing to deploy a new VPN-1/FireWall-1 Enforcement Module. You have five systems
to choose from for your new Enforcement Module and you must meet the following requirements:
Comply with the operating system vendor’s license agreement.Comply with Check Point’s license
agreement.Install the Enforcement Module on a supported operating system.Meet minimum
hardware specifications for the operating system.Meet minimum hardware specifications for the
VPN-1/FireWall-1 Enforcement Module.

Based on the above specifications, which of the following systems is the BEST choice?

Which of the following statements is TRUE of Dr King’s testing and conclusion?

Dr Billis assisting a SecureClient user, who cannot access resources in the VPN Domain. Dr
Billhas performed the following troubleshooting tasks.
Confirmed that the Network Interface Card, Ethernet cable, and router port are all functioning

properly.Reviewed the contents of the SecureClient machine’s Address Resolution Protocol table,
and confirmed entries are consistent with the machine addresses of other machines in the collision
domain.Used Ping, to confirm connectivity with the default gateway and upstream
router.Completed an FTP session to an Internet host.Tried to Telnet to a host in the VPN Domain,
this attempt failed.
Dr Billconcluded the problem is a SecureClient problem, and not a TCP/IP connectivity issue.
Which of the following statements is TRUE of Dr King’s testing and conclusion?

Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?

Dr Billis a Security Administrator preparing to implement a VPN solution for his multisite
organization. To comply with industry regulations, Dr King’s VPN solution must meet the following
requirements:
Portability: StandardKey Management: Automatic, External PKISession Keys: Changed at
configured times during a connection’s lifetimeKey Length: No less than 128 bitData Integrity:
Secure against brute force and inversion attacks
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?


Page 4 of 40« First...23456...102030...Last »