which of the following systems is the BEST choice?


You a preparing to deploy a new VPN-1/FireWall-1 Enforcement Module. You have five systemsto choose from for your new Enforcement Module and you must meet the following requirements:Comply with the operating system vendor’s license agreement.Comply with Check Point’s licenseagreement.Install […]

Which of the following actions should be taken before deploying VPN-1/FireWall-1 in a production role?

Which of the following actions should be taken before deploying VPN-1/FireWall-1 in a productionrole? (Choose three)

Which technology should Dr Billexplain to the executives?

Dr Billis a Security Administrator whose organization maintains several IKE VPNs. Executives inDr King’s organization want to known which mechanism VPN-1/FireWall-1 uses to guarantee theauthenticity of messages. Which technology should Dr Billexplain to the executives?

Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gatekeeper object that supports Q.931 and H.245.

Determine the appropriate routing mode for a Voice over IP (VoIP) Domain Gatekeeper object thatsupports Q.931 and H.245.

Which of the following statements is TRUE of Dr King’s testing and conclusion?

Dr Billis assisting a SecureClient user, who cannot access resources in the VPN Domain. DrBillhas performed the following troubleshooting tasks.Confirmed that the Network Interface Card, Ethernet cable, and router port are all functioningproperly.Reviewed the contents of the SecureClient […]


Which of the following should you do first?

You want to establish a VPN, using certificates. Your VPN will exchange certificates with anexternal partner. Which of the following should you do first?

How does load balancing allow several servers to share and distribute the network load in the VPN-1/FireWall-1 software?

How does load balancing allow several servers to share and distribute the network load in theVPN-1/FireWall-1 software?

Which of the following are credentials supported by VPN-1/FireWall-1 for a gateway-to-gateway encryption?

In gateway-to-gateway encryption, gateways identify themselves by presenting their credentials.Which of the following are credentials supported by VPN-1/FireWall-1 for a gateway-to-gatewayencryption? (Choose two)

Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?

Dr Billis a Security Administrator preparing to implement a VPN solution for his multisiteorganization. To comply with industry regulations, Dr King’s VPN solution must meet the followingrequirements:Portability: StandardKey Management: Automatic, External PKISession Keys: Changed atconfigured […]

Which of the following is NOT true?

Dr Billis a Security Administrator configuring SecuRemote as a remote-access solution for hiscompany. Which of the following is NOT true?Dr BillMUST:



Page 4 of 40« First...23456...102030...Last »