Checkpoint 156-315.81 Practice Test - Questions Answers, Page 54

List of questions
Question 531

Which Correction mechanisms are available with ClusterXL under R81.20?
Question 532

Which upgrade method you should use upgrading from R80.40 to R81.20 to avoid any downtime?
Question 533

How can you see historical data with cpview?
Question 534

Alice & Bob are concurrently logged In via SSH on the same Check Point Security Gateway as user 'admin* however Bob was first logged in and acquired the lock Alice Is not aware that Bob is also togged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAlAclish command is true for overriding Bobs configuration database lock:
Question 535

What command is used to manually failover a cluster during a zero-downtime upgrade?
Question 536

Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?
Question 537

What is required for a site-to-site VPN tunnel that does not use certificates?
Question 538

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
Question 539

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
Question 540

What technologies are used to deny or permit network traffic?
Question