Checkpoint 156-215.81 Practice Test - Questions Answers, Page 11
List of questions
Related questions
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?
Which GUI tool can be used to view and apply Check Point licenses?
How would you determine the software version from the CLI?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Question