When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Answer : B
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
Answer : B
How many images are included with Check Point TE appliance in Recommended Mode?
Answer : A
What is the least amount of CPU cores required to enable CoreXL?
Answer : B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
Answer : B
Which of the following authentication methods ARE NOT used for Mobile Access?
Answer : D
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm
What is the correct command to observe the Sync traffic in a VRRP environment?
Answer : D
What has to be taken into consideration when configuring Management HA?
Answer : A
What is the difference between an event and a log?
Answer : B
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
Answer : A
Which statement is NOT TRUE about Delta synchronization?
Answer : A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm
The Event List within the Event tab contains:
Answer : C
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/
CP_R80_LoggingAndMonitoring/131915
Which statement is correct about the Sticky Decision Function?
Answer : A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7290.htm
Which statement is true regarding redundancy?
Answer : D