QUESTION 41 How can you recreate the account of the Security Administrator, which was created during initial installation of the Management Server on SecurePlatform?
QUESTION 31 The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers Answer: D
QUESTION 21 Which of the following tools is used to generate a Security Gateway R75 configuration report? A. ethereal B. cpinfo C. licview D. infoview Answer: B
QUESTION 11 John is the Security Administrator in his company. He needs to maintain the highest level of security on the firewalls he manages. He is using Check Point R75. Does he need the IPS Software Blade for achieving this goal? A. No, all IPS protections are active, but can’t be uploaded without the license […]
QUESTION 1 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note: Application is the top and Physical is the bottom of the IP stack. A. Network B. Transport C. Data Link D. Session Answer: A