1.
Which of the following commands can provide the most complete restoration of a R77 configuration?
2.
When restoring R77 using the command upgrade_import, which of the following items are NOT restored?
3.
What is the officially accepted diagnostic tool for IP Appliance Support?
4.
Which of these Security Policy changes optimize Security Gateway performance?
5.
Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows: Required. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5. The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?
6.
Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?
7.
You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway's external interface. You browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit the network. How many log entries do you see for that connection in SmartView Tracker?
8.
Which of the following statements BEST describes Check Point's Hide Network Address Translation method?
9.
Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?
10.
NAT can NOT be configured on which of the following objects?