Question 71
An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
Question 72
When simulating a problem on ClusterXL cluster with cphaprob -d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
Question 73
What component of R80 Management is used for indexing?
Question 74
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with
__________________ will not apply.
__________________ will not apply.
Question 75
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check
Point Enterprise Appliances using GAiA/R80.10. Company's Developer Team is having random access issue
to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security
Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela
decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved
Maintenance window. What do you recommend as the best suggestion for Pamela to make sure she
successfully captures entire traffic in context of Firewall and problematic traffic?
Point Enterprise Appliances using GAiA/R80.10. Company's Developer Team is having random access issue
to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security
Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela
decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved
Maintenance window. What do you recommend as the best suggestion for Pamela to make sure she
successfully captures entire traffic in context of Firewall and problematic traffic?