When performing a minimal effort upgrade, what will happen to the network traffic?
A. All connections that were initiated before the upgrade will be dropped, causing network
downtime
B. All connections that were initiated before the upgrade will be handled normally
C. All connections that were initiated before the upgrade will be handled by the standby gateway
D. All connections that were initiated before the upgrade will be handled by the active gateway
A
What is required for a certificate-based VPN tunnel between two gateways with separate
management systems?
A
What level of CPU load on a Secure Network Distributor would indicate that another may be
necessary?
A
How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?
D
John is using Management HA. Which Security Management Server should he use for making
changes?
A. secondary Smartcenter
B. active SmartConsole
C. connect virtual IP of Smartcenter HA
D. primary Log Server
B
Which member of a high-availability cluster should be upgraded first in a Zero downtime upgrade?
A
In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-
box profiles of:
A
Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel?
A
What is the benefit of Manual NAT over Automatic NAT?
A. If you create a new Security Policy, the Manual NAT rules will be transferred to this new policy.
B. There is no benefit since Automatic NAT has in any case higher priority over Manual NAT
C. You have the full control about the priority of the NAT rules
D. On IPSO and GAIA Gateways, it is handled in a stateful manner
C
What destination versions are supported for a Multi-Version Cluster Upgrade?
D
What command is used to manually failover a Multi-Version Cluster during the upgrade?
B
What is the command used to activated Multi-Version Cluster mode?
A
What traffic does the Anti-bot feature block?
A. Command and Control traffic from hosts that have been identified as infected
B. Command and Control traffic to servers with reputation for hosting malware
C. Network traffic that is directed to unknown or malicious servers
D. Network traffic to hosts that have been identified as infected
A
What solution is Multi-queue intended to provide?
C
What is the base level encryption key used by Capsule Docs?
A