1.
Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend before major changes, such as upgrades?
2.
Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend every couple of months,depending on how frequently you make changes to the network or policy?
3.
Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend anytime outside a maintenance window?
4.
The file snapshot generates is very large, and can only be restored to:
5.
When restoring a Security Management Server from a backup file, the restore package can be retrieved from which source?
6.
When upgrading Check Point products in a distributed environment, in which order should you upgrade these components? 1. GUI Client 2. Security Management Server 3. Security Gateway
7.
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?
8.
Typically, when you upgrade the Security Management Server, you install and configure a fresh R75 installation on a new computer and then migrate the database from the original machine. When doing this, what is required of the two machines? They must both have the same:
9.
Typically, when you upgrade the Security Management Server, you install and configure a fresh R75 installation on a new computer and then migrate the database from the original machine. What is the correct order of the steps below to successfully complete this procedure? 1) Export databases from source. 2) Connect target to network. 3) Prepare the source machine for export. 4) Import databases to target. 5) Install new version on target. 6) Test target deployment.
10.
During a Security Management Server migrate export, the system: