00:00

QUESTION 16

Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.

Correct Answer: A
Phase I modes
Between Security Gateways, there are two modes for IKE phase I. These modes only apply to IKEv1:

QUESTION 17

In the Check Point Security Management Architecture, which component(s) can store logs?

Correct Answer: B

QUESTION 18

To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?

Correct Answer: D
https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubm

QUESTION 19

Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?

Correct Answer: B

QUESTION 20

Which icon in the WebUI indicates that read/write access is enabled?

Correct Answer: A