Checkpoint 156-585 Practice Test - Questions Answers, Page 3

List of questions
Question 21

What are the main components of Check Point's Security Management architecture?
Question 22

What does SIM handle?
Question 23

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN Issues?
Question 24

Select the technology that does the following actions
- provides reassembly via streaming for TCP
- handles packet reordering and congestion
- handles payload overlap
- provides consistent stream of data to protocol parsers
Question 25

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
Question 26

How can you start debug of the Unified Policy with all possible flags turned on?
Question 27

What is the purpose of the Hardware Diagnostics Tool?
Question 28

What table does the command "fwaccel conns" pull information from?
Question 29

Check Point Threat Prevention policies can contain multiple policy layers and each layer consists of its own Rule Base Which Threat Prevention daemon is used for Anti-virus?
Question 30

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?
Question