QUESTION 21Drag and Drop QuestionYou need to recommend which tasks must be performed to meet the compliance requirement for the marketing department.Which three actions should recommend?To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. Answer: QUESTION 22Drag and Drop QuestionYou need […]
QUESTION 11You need to recommend a solution to meet the compliance requirement for the legal department.What should you include in the recommendation? A. A retention holdB. The Discovery Management management role groupC. A litigation holdD. The Recipient Management management role group Answer: BExplanation:Discovery management role group is capable of performing legal hold and mailbox search […]
QUESTION 1You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table. You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server. Which three Exchange servers should you […]
QUESTION 111 You want to create an ASCII formatted output file of the fw monitor command. What is the correct syntax to accomplish this task?
QUESTION 101 You intend to upgrade a Check Point Gateway from R65 to R75. Prior to upgrading, you want to backup the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
QUESTION 91 Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:
QUESTION 81 Which of the following commands will completely remove the Security Policy from being enforced on a Security Gateway?
QUESTION 71 ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT:
QUESTION 61 What is the syntax for uninstalling a package using newpkg?
QUESTION 51 Which command displays the installed Security Gateway version? A. fw stat B. cpstat -gw C. fw ver D. tw printver Answer: C
QUESTION 41 How can you recreate the account of the Security Administrator, which was created during initial installation of the Management Server on SecurePlatform?
QUESTION 31 The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers Answer: D
QUESTION 21 Which of the following tools is used to generate a Security Gateway R75 configuration report? A. ethereal B. cpinfo C. licview D. infoview Answer: B
QUESTION 11 John is the Security Administrator in his company. He needs to maintain the highest level of security on the firewalls he manages. He is using Check Point R75. Does he need the IPS Software Blade for achieving this goal? A. No, all IPS protections are active, but can’t be uploaded without the license […]
QUESTION 1 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note: Application is the top and Physical is the bottom of the IP stack. A. Network B. Transport C. Data Link D. Session Answer: A