Question 71

An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
  • Question 72

    When simulating a problem on ClusterXL cluster with cphaprob -d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
  • Question 73

    What component of R80 Management is used for indexing?
  • Question 74

    In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with
    __________________ will not apply.
  • Question 75

    Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check
    Point Enterprise Appliances using GAiA/R80.10. Company's Developer Team is having random access issue
    to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security
    Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela
    decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved
    Maintenance window. What do you recommend as the best suggestion for Pamela to make sure she
    successfully captures entire traffic in context of Firewall and problematic traffic?