لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
How long may verification of one file take for Sandblast Threat Emulation?
A. up to 1 minutes
B. within seconds cleaned file will be provided
C. up to 5 minutes
D. up to 3 minutes
عرض الإجابة
اجابة صحيحة: A
السؤال #2
What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?
A. 4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server
B. 3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization
C. 1 Interface – an interface leading to the organization and the Internet, and configure for synchronization
D. 2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization
عرض الإجابة
اجابة صحيحة: D
السؤال #3
When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:
A. All UDP packets
B. All IPv6 Traffic
C. All packets that match a rule whose source or destination is the Outside Corporate Network
D. CIFS packets
عرض الإجابة
اجابة صحيحة: B
السؤال #4
When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?
A. ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data
B. ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments
C. ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud
D. ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary
عرض الإجابة
اجابة صحيحة: C
السؤال #5
What is the main difference between Threat Extraction and Threat Emulation?
A. Threat Emulation never delivers a file and takes more than 3 minutes to complete
B. Threat Extraction always delivers a file and takes less than a second to complete
C. Threat Emulation never delivers a file that takes less than a second to complete
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete
عرض الإجابة
اجابة صحيحة: C
السؤال #6
For Management High Availability, which of the following is NOT a valid synchronization status?
A. Collision
B. Down
C. Lagging
D. Never been synchronized
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
A. 15 sec
B. 60 sec
C. 5 sec
D. 30 sec
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
A. Dynamic ID
B. RADIUS
C. Username and Password
D. Certificate
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What is mandatory for ClusterXL to work properly?
A. The number of cores must be the same on every participating cluster node
B. The Magic MAC number must be unique per cluster node
C. The Sync interface must not have an IP address configured
D. If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Fill in the blank: A _______ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.
A. Clientless remote access
B. Clientless direct access
C. Client-based remote access
D. Direct access
عرض الإجابة
اجابة صحيحة: A
السؤال #11
An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
A. He can use the fw accel stat command on the gateway
B. He can use the fw accel statistics command on the gateway
C. He can use the fwaccel stat command on the Security Management Server
D. He can use the fwaccel stat command on the gateway
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which command is used to display status information for various components?
A. show all systems
B. show system messages
C. sysmess all
D. show sysenv all
عرض الإجابة
اجابة صحيحة: A
السؤال #13
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:
A. HTTPS for web-based applications and 3DES or RC4 algorithm for native application
B. For end users to access the native applications, they need to install the SSL Network Extender
C. HTTPS for web-based applications and AES or RSA algorithm for native application
D. For end users to access the native application, they need to install the SSL Network Extender
E. HTTPS for web-based applications and 3DES or RC4 algorithm for native application
F. For end users to access the native applications, no additional software is required
عرض الإجابة
اجابة صحيحة: C
السؤال #14
SmartEvent does NOT use which of the following procedures to identify events:
A. Matching a log against each event definition
B. Create an event candidate
C. Matching a log against local exclusions
D. Matching a log against global exclusions
عرض الإجابة
اجابة صحيحة: C
السؤال #15
In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
A. Security Policies
B. Logs and Monitor
C. Manage and Settings
D. Gateways and Servers
عرض الإجابة
اجابة صحيحة: B
السؤال #16
What command verifies that the API server is responding?
A. api stat
B. api status
C. show api_status
D. app_get_status
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #18
What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?
A. S
B. W
C. C
D. Space bar
عرض الإجابة
اجابة صحيحة: D
السؤال #19
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
عرض الإجابة
اجابة صحيحة: D
السؤال #20
What SmartEvent component creates events?
A. Consolidation Policy
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
عرض الإجابة
اجابة صحيحة: B
السؤال #21
What is the command to see cluster status in cli expert mode?
A. fw ctl stat
B. clusterXL stat
C. clusterXL status
D. cphaprob stat
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: