Sonny is the Security Administrator for a company with a large call center. The management team in the center is concerned that employees may be installing and attempting to use peer-to-peer file-sharing utilities, during their lunch breaks. The call center's network is protected by an internal Security Gateway. which is configured to drop peer-to-peer file-sharing traffic. Which application should Sonny use, to determine the number of packets dropped by each Gateway?
A. SmartUpdate
B. SmartView Monitor
C. SmartView Tracker
D. SmartDashboard
E. SmartView Status
正解:B
質問 2:
You are preparing computers for a new ClusterXL deployment. For you cluster, you plan to use three machines with the following configurations:

Are these machines correctly configured for a ClusterXL deployment?
A. No, QuadCards are not supported with ClusterXL.
B. No, a cluster must have an even numbers of machines.
C. Yes, these machines are configured correctly for a ClusterXL deployment.
D. No, all machines in a cluster must be running on the same OS.
E. No, ClusterXL is not supported on Red Hat Linux.
正解:D
質問 3:
A cluster contains two members, with external interfaces 172.28.108.1 and 172.28.108.2.
The internal interfaces are 10.4.8.1 and 10.4.8.2. The external cluster's IP address is
172.28.108.3, and the internal cluster's IP address is 10.4.8.3. The synchronization interfaces are 192.168.1.1 and 192.168.1.2. The Security Administrator discovers State Sychronization is not working properly.cphaprob -a if command output displays as follows:

What is causing the State Synchronization problem?
A. Another cluster is using 192.168.1.3 as one of the unprotected interfaces.
B. The synchronization interface on the cluster member object's Topology tab is enabled with "Cluster Interface". Disable this interface.
C. The synchronization network has a cluster, with IP address 192.168.1.3 defined in the gateway-cluster object. Remove the 192.168.1.3 VIP interface from the cluster topology.
D. Interfaces 192.168.1.1 and 192.168.1.2 have defined 192.168.1.3 as a sub-interface.
正解:C
質問 4:
How can you prevent delay-sensitive applications, such as video and voice traffic, from being dropped due to long queue using Check Point QoS solution?
A. Weighted Fair queuing
B. DiffServ rule
C. guaranteed per connection
D. guaranteed per VOIP rule
E. Low latency class
正解:E
質問 5:
Which of the following commands is used to restore NGX configuration information?
A. restore
B. cpinfo -i
C. cpconfig
D. upgrade_import
E. fwm dbimport
正解:D
Itou -
過去問解説もくわしくて、とても勉強しやすい本でした。これ一冊でなんとかなりそう