Use the table to match the BEST Management High Availability synchronication-status
descriptions for your Security Management Server (SMS).
MegaCorps’ disaster recovery plan is past due for an update to the backup and restore section to
enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the
following required and desired objectives:
RequireD. Security Policy repository must be backed up no less frequently than every 24 hours.
DesireD. Back up R77 components enforcing the Security Policies at least once a week.
DesireD. Back up R77 logs at least once a week.
You develop a disaster recovery plan proposing the following:
* Use the utility cron to run the command upgrade_export each night on the Security Management
* Configure the organization’s routine backup software to back up files created by the command
* Configure GAiA back up utility to back up Security Gateways every Saturday night.
* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.
* Configure an automatic, nightly logswitch.
* Configure the organization’s routine back up software to back up the switched logs every night.
The corporate IT change review committee decides your plan:
Match the VPN-related terms with their definitions. Each correct term is only used once.
To provide full connectivity upgrade status, use command
In a zero downtime firewall cluster environment, what command syntax do you run to avoid
switching problems around the cluster for command cphaconf?
In a zero downtime scenario, which command do you run manually after all cluster members are upgraded?
Complete this statement. To save interface information before upgrading a Windows Gateway,
Fill in the blank with a numeric value. The default port number for standard TCP connections with
the LDAP server is
Fill in the blank with a numeric value. The default port number for Secure Sockets Layer (SSL)
connections with the LDAP Server is
The command useful for debugging by capturing packet information, including verifying LDAP
authentication on all Check Point platforms is