Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Checkpoint 156-215.80 Dumps

Page: 1 / 53
Total 525 questions

Check Point Certified Security Administrator R80 Questions and Answers

Question 1

DLP and Geo Policy are examples of what type of Policy?

Options:

A.

Standard Policies

B.

Shared Policies

C.

Inspection Policies

D.

Unified Policies

Question 2

Which of the following is NOT a component of a Distinguished Name?

Options:

A.

Organization Unit

B.

Country

C.

Common name

D.

User container

Question 3

Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?

as

Options:

A.

Check Point software deployed on a non-Check Point appliance.

B.

The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability.

C.

A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.

D.

A check Point Management Server software using the Open SSL.

Question 4

What is NOT an advantage of Packet Filtering?

Options:

A.

Low Security and No Screening above Network Layer

B.

Application Independence

C.

High Performance

D.

Scalability

Question 5

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?

Options:

A.

Central

B.

Corporate

C.

Formal

D.

Local

Question 6

Web Control Layer has been set up using the settings in the following dialogue:

as

Consider the following policy and select the BEST answer.

as

Options:

A.

Traffic that does not match any rule in the subpolicy is dropped.

B.

All employees can access only Youtube and Vimeo.

C.

Access to Youtube and Vimeo is allowed only once a day.

D.

Anyone from internal network can access the internet, expect the traffic defined in drop rules 5.2, 5.5 and 5.6.

Question 7

Which of the following is NOT a license activation method?

Options:

A.

SmartConsole Wizard

B.

Online Activation

C.

License Activation Wizard

D.

Offline Activation

Question 8

ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house R80 Management to the other administrators in ABC Corp.

as

How will you describe the new “Publish” button in R80 Management Console?

Options:

A.

The Publish button takes any changes an administrator has made in their management session, publishes a copy to the Check Point of R80, and then saves it to the R80 database.

B.

The Publish button takes any changes an administrator has made in their management session and publishes a copy to the Check Point Cloud of R80 and but does not save it to the R80

C.

The Publish button makes any changes an administrator has made in their management session visible to all other administrator sessions and saves it to the Database.

D.

The Publish button makes any changes an administrator has made in their management session visible to the new Unified Policy session and saves it to the Database.

Question 9

What are the three authentication methods for SIC?

Options:

A.

Passwords, Users, and standards-based SSL for the creation of security channels

B.

Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C.

Packet Filtering, certificates, and 3DES or AES128 for encryption

D.

Certificates, Passwords, and Tokens

Question 10

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Options:

A.

One machine, but it needs to be installed using SecurePlatform for compatibility purposes.

B.

One machine

C.

Two machines

D.

Three machines

Question 11

Two administrators Dave and Jon both manage R80 Management as administrators for ABC Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule no.6 in his SmartConsole view even though Jon has it his in his SmartConsole view?

as

Options:

A.

Jon is currently editing rule no.6 but has Published part of his changes.

B.

Dave is currently editing rule no.6 and has marked this rule for deletion.

C.

Dave is currently editing rule no.6 and has deleted it from his Rule Base.

D.

Jon is currently editing rule no.6 but has not yet Published his changes.

Question 12

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Options:

A.

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B.

Create a separate Security Policy package for each remote Security Gateway.

C.

Create network object that restrict all applicable rules to only certain networks.

D.

Run separate SmartConsole instances to login and configure each Security Gateway directly.

Question 13

In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?

Options:

A.

Display policies and logs on the administrator's workstation.

B.

Verify and compile Security Policies.

C.

Processing and sending alerts such as SNMP traps and email notifications.

D.

Store firewall logs to hard drive storage.

Question 14

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

Options:

A.

UserCheck

B.

Active Directory Query

C.

Account Unit Query

D.

User Directory Query

Question 15

Which of the following is TRUE regarding Gaia command line?

Options:

A.

Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is used only for OS level tasks.

B.

Configuration changes should be done in expert-mode and CLISH is used for monitoring.

C.

Configuration changes should be done in mgmt-cli and use expert-mode for OS-level tasks.

D.

All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks.

Question 16

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________.

Options:

A.

User Directory

B.

Captive Portal and Transparent Kerberos Authentication

C.

Captive Portal

D.

UserCheck

Question 17

While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?

Options:

A.

Security Gateways is not part of the Domain

B.

SmartConsole machine is not part of the domain

C.

SMS is not part of the domain

D.

Identity Awareness is not enabled on Global properties

Question 18

What is the purpose of Captive Portal?

Options:

A.

It provides remote access to SmartConsole

B.

It manages user permission in SmartConsole

C.

It authenticates users, allowing them access to the Internet and corporate resources

D.

It authenticates users, allowing them access to the Gaia OS

Question 19

Which of the following is NOT an integral part of VPN communication within a network?

Options:

A.

VPN key

B.

VPN community

C.

VPN trust entities

D.

VPN domain

Question 20

Fill in the blanks: The _________ collects logs and sends them to the _________ .

Options:

A.

Log server; security management server

B.

Log server; Security Gateway

C.

Security management server; Security Gateway

D.

Security Gateways; log server

Question 21

Which directory holds the SmartLog index files by default?

Options:

A.

$SMARTLOGDIR/data

B.

$SMARTLOG/dir

C.

$FWDIR/smartlog

D.

$FWDIR/log

Question 22

Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .

Options:

A.

Firewall policy install

B.

Threat Prevention policy install

C.

Anti-bot policy install

D.

Access Control policy install

Question 23

Office mode means that:

Options:

A.

SecureID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

B.

Users authenticate with an Internet browser and use secure HTTPS connection.

C.

Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.

D.

Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

Question 24

Which of the following is NOT an alert option?

Options:

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Question 25

Administrator wishes to update IPS from SmartConsole by clicking on the option “update now” under the IPS tab. Which device requires internet access for the update to work?

Options:

A.

Security Gateway

B.

Device where SmartConsole is installed

C.

SMS

D.

SmartEvent

Question 26

You want to reset SIC between smberlin and sgosaka.

as

In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was successfully initialized and jumps back to the menu. When trying to establish a connection, instead of a working connection, you receive this error message:

as

What is the reason for this behavior?

Options:

A.

The Gateway was not rebooted, which is necessary to change the SIC key.

B.

You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the object, choose Basic Setup > Initialize).

C.

The check Point services on the Gateway were not restarted because you are still in the cpconfig utility.

D.

The activation key contains letters that are on different keys on localized keyboards. Therefore, the activation can not be typed in a matching fashion.

Question 27

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?

Options:

A.

No, since “maintain current active cluster member” option on the cluster object properties is enabled by default

B.

No, since “maintain current active cluster member” option is enabled by default on the Global Properties

C.

Yes, since “Switch to higher priority cluster member” option on the cluster object properties is enabled by default

D.

Yes, since “Switch to higher priority cluster member” option is enabled by default on the Global Properties

Question 28

Why would an administrator see the message below?

as

Options:

A.

A new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding.

B.

A new Policy Package created on the Management is going to be installed to the existing Gateway.

C.

A new Policy Package created on the Gateway is going to be installed on the existing Management.

D.

A new Policy Package created on the Gateway and transferred to the management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.

Question 29

To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?

Options:

A.

Full HA Cluster

B.

High Availability

C.

Standalone

D.

Distributed

Question 30

Which Check Point software blade provides protection from zero-day and undiscovered threats?

Options:

A.

Firewall

B.

Threat Emulation

C.

Application Control

D.

Threat Extraction

Question 31

You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?

Options:

A.

backup

B.

Database Revision

C.

snapshot

D.

migrate export

Question 32

Which of the following is NOT a set of Regulatory Requirements related to Information Security?

Options:

A.

ISO 37001

B.

Sarbanes Oxley (SOX)

C.

HIPPA

D.

PCI

Question 33

Which command is used to obtain the configuration lock in Gaia?

Options:

A.

Lock database override

B.

Unlock database override

C.

Unlock database lock

D.

Lock database user

Question 34

Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______

Options:

A.

UserCheck

B.

User Directory

C.

User Administration

D.

User Center

Question 35

What CLI utility allows an administrator to capture traffic along the firewall inspection chain?

Options:

A.

show interface (interface) –chain

B.

tcpdump

C.

tcpdump /snoop

D.

fw monitor

Question 36

Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.

Options:

A.

Application Control

B.

Data Awareness

C.

URL Filtering

D.

Threat Emulation

Question 37

You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?

1. Run cpconfig on the Gateway, select Secure Internal Communication, enter the activation key, and reconfirm.

2. Initialize Internal Certificate Authority (ICA) on the Security Management Server.

3. Configure the Gateway object with the host name and IP addresses for the remote site.

4. Click the Communication button in the Gateway object's General screen, enter the activation key, and click Initialize and OK.

5. Install the Security Policy.

Options:

A.

2, 3, 4, 1, 5

B.

2, 1, 3, 4, 5

C.

1, 3, 2, 4, 5

D.

2, 3, 4, 5, 1

Question 38

What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?

Options:

A.

degrades performance as the Security Policy grows in size

B.

requires additional Check Point appliances

C.

requires additional software subscription

D.

increases cost

Question 39

Which of the following is NOT a VPN routing option available in a star community?

Options:

A.

To satellites through center only

B.

To center, or through the center to other satellites, to Internet and other VPN targets

C.

To center and to other satellites through center

D.

To center only

Question 40

Which policy type is used to enforce bandwidth and traffic control rules?

Options:

A.

Threat Emulation

B.

Access Control

C.

QoS

D.

Threat Prevention

Question 41

Which component functions as the Internal Certificate Authority for R77?

Options:

A.

Security Gateway

B.

Management Server

C.

Policy Server

D.

SmartLSM

Question 42

Which NAT rules are prioritized first?

Options:

A.

Post-Automatic/Manual NAT rules

B.

Manual/Pre-Automatic NAT

C.

Automatic Hide NAT

D.

Automatic Static NAT

Question 43

Which of these attributes would be critical for a site-to-site VPN?

Options:

A.

Scalability to accommodate user groups

B.

Centralized management

C.

Strong authentication

D.

Strong data encryption

Question 44

In what way are SSL VPN and IPSec VPN different?

Options:

A.

SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless

B.

SSL VPN adds an extra VPN header to the packet, IPSec VPN does not

C.

IPSec VPN does not support two factor authentication, SSL VPN does support this

D.

IPSec VPN uses an additional virtual adapter, SSL VPN uses the client network adapter only

Question 45

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

4) Install policy.

Ms McHanry tries to access the resource but is unable. What should she do?

Options:

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”.

B.

Have the security administrator reboot the firewall.

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role.

D.

Install the Identity Awareness agent on her iPad.

Question 46

You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-site VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicious?

Options:

A.

SmartDashboard

B.

SmartUpdate

C.

SmartView Status

D.

SmartView Tracker

Question 47

You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?

Options:

A.

A group with generic user

B.

All users

C.

LDAP Account Unit Group

D.

Internal user Group

Question 48

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

Options:

A.

Check Point Password

B.

TACACS

C.

LDAP

D.

Windows password

Question 49

MegaCorp's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.

How do you apply the license?

Options:

A.

Using the remote Gateway's IP address, and attaching the license to the remote Gateway via SmartUpdate.

B.

Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.

C.

Using the remote Gateway's IP address, and applying the license locally with command cplic put.

D.

Using each of the Gateway's IP addresses, and applying the licenses on the Security Management Server with the command cprlic put.

Question 50

Review the rules. Assume domain UDP is enabled in the implied rules.

as

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

Options:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Question 51

Which rule is responsible for the user authentication failure?

as

Options:

A.

Rule 4

B.

Rule 6

C.

Rule 3

D.

Rule 5

Question 52

When defining QoS global properties, which option below is not valid?

Options:

A.

Weight

B.

Authenticated timeout

C.

Schedule

D.

Rate

Question 53

Which of the below is the MOST correct process to reset SIC from SmartDashboard?

Options:

A.

Run cpconfig, and click Reset.

B.

Click the Communication button for the firewall object, then click Reset. Run cpconfig on the gateway and type a new activation key.

C.

Run cpconfig, and select Secure Internal Communication > Change One Time Password.

D.

Click Communication > Reset on the Gateway object, and type a new activation key.

Question 54

When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?

Options:

A.

As expert user, issue these commands:# IP link set eth0 down# IP link set eth0 addr 00:0C:29:12:34:56# IP link set eth0 up

B.

Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field(conf:(conns:(conn:hwaddr (“00:0C:29?:12:34:56”)

C.

As expert user, issue the command:# IP link set eth0 addr 00:0C:29:12:34:56

D.

Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field Physical Address, and press Apply to save the settings.

Question 55

What is the Manual Client Authentication TELNET port?

Options:

A.

23

B.

264

C.

900

D.

259

Question 56

When launching SmartDashboard, what information is required to log into R77?

Options:

A.

User Name, Management Server IP, certificate fingerprint file

B.

User Name, Password, Management Server IP

C.

Password, Management Server IP

D.

Password, Management Server IP, LDAP Server IP

Question 57

VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?

Options:

A.

3DES and MD5

B.

Certificates and IPsec

C.

Certificates and pre-shared secret

D.

IPsec and VPN Domains

Question 58

Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?

Options:

A.

There is no traffic queue to be handled

B.

Several NICs can use one traffic queue by one CPU

C.

Each NIC has several traffic queues that are handled by multiple CPU cores

D.

Each NIC has one traffic queue that is handled by one CPU

Question 59

You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?

Options:

A.

Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.

B.

Select Block intruder from the Tools menu in SmartView Tracker.

C.

Create a Suspicious Activity Rule in Smart Monitor.

D.

Add a temporary rule using SmartDashboard and select hide rule.

Question 60

A digital signature:

Options:

A.

Guarantees the authenticity and integrity of a message.

B.

Automatically exchanges shared keys.

C.

Decrypts data to its original form.

D.

Provides a secure key exchange mechanism over the Internet.

Question 61

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

Options:

A.

INSPECT Engine

B.

Next-Generation Firewall

C.

Packet Filtering

D.

Application Layer Firewall

Question 62

What are the two types of NAT supported by the Security Gateway?

Options:

A.

Destination and Hide

B.

Hide and Static

C.

Static and Source

D.

Source and Destination

Question 63

You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?

Options:

A.

restore_backup

B.

import backup

C.

cp_merge

D.

migrate import

Question 64

Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.

as

What is the most likely reason?

Options:

A.

Check Point R80 SmartConsole authentication is more secure than in previous versions and Vanessa requires a special authentication key for R80 SmartConsole. Check that the correct key details are used.

B.

Check Point Management software authentication details are not automatically the same as the Operating System authentication details. Check that she is using the correct details.

C.

SmartConsole Authentication is not allowed for Vanessa until a Super administrator has logged in first and cleared any other administrator sessions.

D.

Authentication failed because Vanessa’s username is not allowed in the new Threat Prevention console update checks even though these checks passed with Gaia.

Question 65

Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers?

Options:

A.

Anti-Malware

B.

IPS

C.

Anti-bot

D.

Anti-Spam

Question 66

When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?

Options:

A.

Access Role

B.

User Group

C.

SmartDirectory Group

D.

Group Template

Question 67

What are the three components for Check Point Capsule?

Options:

A.

Capsule Docs, Capsule Cloud, Capsule Connect

B.

Capsule Workspace, Capsule Cloud, Capsule Connect

C.

Capsule Workspace, Capsule Docs, Capsule Connect

D.

Capsule Workspace, Capsule Docs, Capsule Cloud

Question 68

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

as

Options:

A.

Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”

B.

On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”

C.

In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”

D.

On the Security Management Server object, check the box “Identity Logging”

Question 69

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:

A.

UDP port 265

B.

TCP port 265

C.

UDP port 256

D.

TCP port 256

Question 70

What is true about the IPS-Blade?

Options:

A.

in R80, IPS is managed by the Threat Prevention Policy

B.

in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict

C.

in R80, IPS Exceptions cannot be attached to “all rules”

D.

in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Question 71

You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?

Options:

A.

Open SmartLog and connect remotely to the wireless controller

B.

Open SmartEvent to see why they are being blocked

C.

Open SmartDashboard and review the logs tab

D.

From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.

Question 72

You have discovered suspicious activity in your network. What is the BEST immediate action to take?

Options:

A.

Create a policy rule to block the traffic.

B.

Create a suspicious action rule to block that traffic.

C.

Wait until traffic has been identified before making any changes.

D.

Contact ISP to block the traffic.

Question 73

What object type would you use to grant network access to an LDAP user group?

Options:

A.

Access Role

B.

User Group

C.

SmartDirectory Group

D.

Group Template

Question 74

Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?

Options:

A.

Application Control

B.

Threat Emulation

C.

Anti-Virus

D.

Advanced Networking Blade

Question 75

Fill in the blank: Back up and restores can be accomplished through_________.

Options:

A.

SmartConsole, WebUI, or CLI

B.

WebUI, CLI, or SmartUpdate

C.

CLI, SmartUpdate, or SmartBackup

D.

SmartUpdate, SmartBackup, or SmartConsole

Question 76

Fill in the blank: The position of an implied rule is manipulated in the __________________ window.

Options:

A.

NAT

B.

Firewall

C.

Global Properties

D.

Object Explorer

Question 77

Which of the following situations would not require a new license to be generated and installed?

Options:

A.

The Security Gateway is upgraded.

B.

The existing license expires.

C.

The license is upgraded.

D.

The IP address of the Security Management or Security Gateway has changed.

Question 78

In ____________ NAT, the ____________ is translated.

Options:

A.

Hide; source

B.

Static; source

C.

Simple; source

D.

Hide; destination

Page: 1 / 53
Total 525 questions