1.
In ClusterXL, which of the following processes are defined by default as critical devices? 105
2.
When configuring site-to-site VPN High Availability (HA) with MEP, which of the following is correct?
3.
You want to establish a VPN, using Certificates. Your VPN will exchange Certificates with an external partner. Which of the following activities should you dc first?
4.
You are establishing a ClusterXL environment, with the following topology: VIP internal cluster IP = 172.16.10.3; VIP external cluster IP = 192.168.10.3 ClusterMember1:4NICs,3enabled: hme(): 106 192.168.10.1/24, hmel: 10.10.10.1/24, qfe2: 172.16.10.1/24 Cluster Member 2: 5 NICs, 3 enabled; hme3: 192.168.10.2/24, hmel: 10.10.10.2/24, hme2: 172.16.10.2/24 External interfaces 192.168.10.1 and 192.168.10.2 connect to a VLAN switch. The upstream router connects to the same VLAN switch. Internal interfaces 172.16.10.1 and 172.16.10.2 connect to a hub. 10.10.10.0 is the synchronization network. The SmartCenter Server is located on the internal network with IP 172.16.10.3. What is the problem with this configuration?
5.
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use four machines with the following configurations: Cluster Member 1: OS: SecurePlatform, NICs: QuadCard, memory: 512 MB, Security Gateway only, and version: VPN-1 NGX R65 Cluster Member 2: OS: SecurePlatform, NICs: 4 Intel 3Com, memory: 512 MB, Security Gateway only, and version: VPN-1 NGX R65 Cluster Member 3: OS: SecurePlatform, NICs: 4 other manufacturers, memory: 256 MB, Security Gateway only, and version: VPN-1 NGX R65 SmartCenter Server: MS Windows 2000, NIC: Intel NIC (1), Security Gateway and primary SmartCenter Server installed, version: VPN-1 NGX R65 Are these machines correctly configured for a ClusterXL deployment?
6.
What port is used for communication to the User Center with SmartUpdate? 107
7.
Which command line interface utility allows the administrator to verify the name and timestamp of the Security Policy currently installed on a firewall module?
8.
The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSI model?
9.
What physical machine must have access to the User Center public IP when checking for new packages with SmartUpdate?
10.
Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Why?