ExamGecko
Home / Checkpoint / 156-585 / List of questions
Ask Question

Checkpoint 156-585 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

What are the main components of Check Point's Security Management architecture?

Management server, management database, log server, automation server
Management server, management database, log server, automation server
Management server, Security Gateway. Multi-Domain Server, SmartEvent Server
Management server, Security Gateway. Multi-Domain Server, SmartEvent Server
Management Server. Log Server. LDAP Server, Web Server
Management Server. Log Server. LDAP Server, Web Server
Management server Log server, Gateway server. Security server
Management server Log server, Gateway server. Security server
Suggested answer: A
asked 16/09/2024
Luca Bombelli
40 questions

Question 22

Report Export Collapse

What does SIM handle?

Become a Premium Member for full access
  Unlock Premium Member

Question 23

Report Export Collapse

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN Issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 24

Report Export Collapse

Select the technology that does the following actions

- provides reassembly via streaming for TCP

- handles packet reordering and congestion

- handles payload overlap

- provides consistent stream of data to protocol parsers

Become a Premium Member for full access
  Unlock Premium Member

Question 25

Report Export Collapse

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Become a Premium Member for full access
  Unlock Premium Member

Question 26

Report Export Collapse

How can you start debug of the Unified Policy with all possible flags turned on?

Become a Premium Member for full access
  Unlock Premium Member

Question 27

Report Export Collapse

What is the purpose of the Hardware Diagnostics Tool?

Become a Premium Member for full access
  Unlock Premium Member

Question 28

Report Export Collapse

What table does the command "fwaccel conns" pull information from?

Become a Premium Member for full access
  Unlock Premium Member

Question 29

Report Export Collapse

Check Point Threat Prevention policies can contain multiple policy layers and each layer consists of its own Rule Base Which Threat Prevention daemon is used for Anti-virus?

Become a Premium Member for full access
  Unlock Premium Member

Question 30

Report Export Collapse

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

Become a Premium Member for full access
  Unlock Premium Member
Total 114 questions
Go to page: of 12

Related questions