After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?
A. cvpnd_restart
B. cvpnd restart
C. cvpnd_restart
D. cvpnrestart
正解:C
質問 2:
Tom has been tasked to install Check Point R81 in a distributed deployment.
Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
A. One machine
B. Three machines
C. Two machines
D. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
正解:C
質問 3:
What kind of information would you expect to see when using the "sim affinity -I" command?
A. Overview over SecureXL templated connections
B. The involved firewall kernel modules in inbound and outbound packet chain
C. The VMACs used in a Security Gateway cluster
D. Affinity Distribution
正解:D
質問 4:
In ClusterXL Load Sharing Multicast Mode:
A. every member of the cluster received all of the packets sent to the cluster IP address
B. only the secondary member receives packets sent to the cluster IP address
C. packets sent to the cluster IP address are distributed equally between all members of the cluster
D. only the primary member received packets sent to the cluster IP address
正解:A
質問 5:
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor.
Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
A. SandBlast
B. IPS AND Application Control
C. IPS, anti-virus and anti-bot
D. IPS, anti-virus and e-mail security
正解:A
質問 6:
How often does Threat Emulation download packages by default?
A. Once per day
B. Once an hour
C. Twice per day
D. Once a week
正解:A
質問 7:
Full synchronization between cluster members is handled by Firewall Kernel.
Which port is used for this?
A. UDP port 265
B. TCP port 256
C. UDP port 256
D. TCP port 265
正解:B
河野** -
156-315.81.20基本的に用語とその概要を網羅する勉強になるため言語学ほど実践的な過去問は必要ないかと思われますが、それにしても過去問の収録数は少なめです。念を入れたい人は本書を導入とした上で過去問中心の参考書も併用することをPass4Testおすすめします。