You find that Gateway fw2 can NOT be added to the cluster object. What are possible reasons for that?
Exhibit:

1) fw2 is a member in a VPN community.
2) ClusterXL software blade is not enabled on fw2.
3) fw2 is a DAIP Gateway.
A. 1 or 3
B. All
C. 1 or 2
D. 2 or 3
正解:A
質問 2:
The "MAC magic" value must be modified under the following condition:
A. There is more than one cluster connected to the same VLAN
B. A firewall cluster is configured to use Multicast for CCP traffic
C. There are more than two members in a firewall cluster
D. A firewall cluster is configured to use Broadcast for CCP traffic
正解:D
質問 3:
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
A. The access should be changed to authenticate the user instead of the PC
B. Investigate this as a network connectivity issue
C. John should install the Identity Awareness Agent
D. John should lock and unlock his computer
正解:A
質問 4:
You need to change the MAC-address on eth2 interface of the gateway. What command and what mode will you use to achieve this goal?
A. set interface eth2 mac-addr 11:11:11:11:11:11; CLISH
B. ifconfig eth1 hw 11:11:11:11:11:11; expert
C. set interface eth2 hw-addr 11:11:11:11:11:11; CLISH
D. ethtool -i eth2 mac 11:11:11:11:11:11; expert
正解:A
質問 5:
Which of the following are authentication methods that Security Gateway R80 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.
A. Connection, User, Client
B. User, Client, Session
C. Proxied, User, Dynamic, Session
D. User, Proxied, Session
正解:B
質問 6:
How could you compare the Fingerprint shown to the Fingerprint on the server?
Exhibit:

A. Run cpconfig, select the Certificate Authority option and view the fingerprint
B. Run cpconfig, select the GUI Clients option and view the fingerprint
C. Run sysconfig, select the Server Fingerprint option and view the fingerprint
D. Run cpconfig, select the Certificate's Fingerprint option and view the fingerprint
正解:D
質問 7:
The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is
正解:
fw monitor
小岛** -
CheckPoint新の試験問題に徹底対応した、156-915.80受験生必携の問題集です。Pass4Testの問題集を買うのが二回目になります。