What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
What is the correct order of the default “fw monitor” inspection points?
What are valid authentication methods for mutual authenticating the VPN gateways?
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational.
When it re-joins the cluster, will it become active automatically?
When users connect to the Mobile Access portal they are unable to open File Shares.
Which log file would you want to examine?
Fill in the blanks: Gaia can be configured using the ______ or _____ .
What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?
Alice was asked by Bob to implement the Check Point Mobile Access VPN blade - therefore are some basic configuration steps required - which statement about the configuration steps is true?
What solution is multi-queue intended to provide?
What is the purpose of the command "ps aux | grep twd"?
The back-end database for Check Point R81 Management uses:
Fill in the blank: An identity server uses a _________________ to trust a Terminal Server Identity Agent.
The back-end database for Check Point Management uses:
Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?