QUESTION 91 Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:
QUESTION 81 Which of the following commands will completely remove the Security Policy from being enforced on a Security Gateway?
QUESTION 71 ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT:
QUESTION 61 What is the syntax for uninstalling a package using newpkg?
QUESTION 51 Which command displays the installed Security Gateway version? A. fw stat B. cpstat -gw C. fw ver D. tw printver Answer: C
QUESTION 41 How can you recreate the account of the Security Administrator, which was created during initial installation of the Management Server on SecurePlatform?
QUESTION 31 The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers Answer: D
QUESTION 21 Which of the following tools is used to generate a Security Gateway R75 configuration report? A. ethereal B. cpinfo C. licview D. infoview Answer: B
QUESTION 11 John is the Security Administrator in his company. He needs to maintain the highest level of security on the firewalls he manages. He is using Check Point R75. Does he need the IPS Software Blade for achieving this goal? A. No, all IPS protections are active, but can’t be uploaded without the license […]
QUESTION 1 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note: Application is the top and Physical is the bottom of the IP stack. A. Network B. Transport C. Data Link D. Session Answer: A