ExamGecko
Question list
Search
Search

Question 79 - 156-215.81 discussion

Report
Export

Which two of these Check Point Protocols are used by ?

A.
ELA and CPD
Answers
A.
ELA and CPD
B.
FWD and LEA
Answers
B.
FWD and LEA
C.
FWD and CPLOG
Answers
C.
FWD and CPLOG
D.
ELA and CPLOG
Answers
D.
ELA and CPLOG
Suggested answer: B

Explanation:

The two Check Point Protocols that are used by are FWD and LEA567. FWD is the Firewall Daemon that handles communication between different Check Point components, such as Security Management Server, Security Gateway, SmartConsole, etc. LEA is the Log Export API that allows external applications to retrieve logs from the Security Gateway or Security Management Server. Therefore, the correct answer is B. FWD and LEA.

Reference:Border Gateway Protocol - Check Point Software,Check Point IPS Datasheet,List of valid protocols for services? - Check Point CheckMates

asked 16/09/2024
Tudor Voicu
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first