Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
Correct Answer:
A
Phase I modes
Between Security Gateways, there are two modes for IKE phase I. These modes only apply to IKEv1:
In the Check Point Security Management Architecture, which component(s) can store logs?
Correct Answer:
B
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
Correct Answer:
D
https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubm
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
Correct Answer:
B
Which icon in the WebUI indicates that read/write access is enabled?
Correct Answer:
A