|
i got it from itcertkeys.com u must visit this site for success thanks
|
Question 1. You work a network administrator for ITCertKeys.com. You configure a Check Point QoS Rule Base with two rules: an H.323 rule with a weight of 10, and the Default Rule with a weight of 10. The H.323 rule includes a per-connection guarantee of 384 Kbps, and a per-connection limit of 512 Kbps. The per-connection guarantee is for four connections, and no additional connections are allowed in the Action properties. If traffic passing through the QoS Module matches both rules, which of the following is true? A. Neither rule will be allocated more than 10% of available bandwidth. B. The H.323 rule will consume no more than 2048 Kbps of available bandwidth. C. 50% of available bandwidth will be allocated to the H.323 rule. D. 50% of available bandwidth will be allocated to the Default Rule E. Each H.323 connection will receive at least 512 Kbps of bandwidth. Answer: B Question 2. ITCertKeys.com has many VPN-1 Edge gateways at various branch offices, to allow VPN-1 SecureClient users to access ITCertKeys.com resources. For security reasons, ITCertKeys.com's Secure policy requires all Internet traffic initiated behind the VPN-1 Edge gateways first be inspected by your headquarters' VPN-1 Pro Security Gateway. How do you configure VPN routing in this star VPN Community? A. To the Internet an other targets only B. To the center and other satellites, through the center C. To the center only D. To the center, or through the center to other satellites, then to the Internet and other VPN targets Answer: D Explanation: This configuration option can be found in the properties window under Advanced Settings > VPN Routing for a Star Community VPN Object (see screenshot) From the help file on this properties page: Three options are available: * To center only. No VPN routing actually occurs. Only connections between the Satellite Gateways and Central Gateway go through the VPN tunnel. Other connections are routed in the normal way * To center and to other satellites through center. Use VPN routing for connection between satellites. Every packet passing from a Satellite Gateway to another Satellite Gateway is routed through the Central Gateway. Connection between Satellite Gateways and Gateways that do not belong to the community are routed in the normal way. * To center, or through the center to other satellites, to internet and other VPN targets. Use VPN routing for every connection a Satellite Gateway handles. Packets sent by a Satellite Gateway pass through the VPN tunnel to the Central Gateway before being routed to the destination address. Question 3. You are preparing to configure your VoIP Domain Gatekeeper object. Which two other object should you have created first? A. An object to represent the IP phone network, AND an object to represent the host on which the proxy is installed. B. An object to represent the PSTN phone network, AND an object to represent the IP phone network C. An object to represent the IP phone network, AND an object to represent the host on which the gatekeeper is installed. D. An object to represent the Q.931 service origination host, AND an object to represent the H.245 termination host E. An object to represent the call manager, AND an object to represent the host on which the transmission router is installed. Answer: C Question 4. Which Check Point QoS feature is used to dynamically allocate relative portions of available bandwidth? A. Guarantees B. Differentiated Services C. Limits D. Weighted Fair Queuing E. Low Latency Queing Answer: D Explanation: Bandwidth Allocation and Rules A rule can specify three factors to be applied to bandwidth allocation for classified connections: Weight Weight is the relative portion of the available bandwidth that is allocated to a rule. To calculate what portion of the bandwidth the connections matched to a rule receive, use the following formula: This rule's portion = this rule's weight / total weight of all rules with open connections For example, if this rule's weight is 12 and the total weight of all the rules under which connections are currently open is 120, then all the connections open under this rule are allocated 12/120 (or 10%) of the available bandwidth. In practice, a rule may get more than the bandwidth allocated by this formula, if other rules are not using their maximum allocated bandwidth. Unless a per connection limit or guarantee is defined for a rule, all connections under a rule receive equal weight. Allocating bandwidth according to weights ensures full utilization of the line even if a specific class is not using all of its bandwidth. In such a case, the left over bandwidth is divided among the remaining classes in accordance with their relative weights. Units are configurable, see "Defining QoS Global Properties" on page 94. Default Rule Chapter 4 Basic QoS Policy Management 35 Guarantees A guarantee allocates a minimum bandwidth to the connections matched with a rule. Guarantees can be defined for: the sum of all connections within a rule A total rule guarantee reserves a minimum bandwidth for all the connections under a rule combined. The actual bandwidth allocated to each connection depends on the number of open connections that match the rule. The total bandwidth allocated to the rule can be no less than the guarantee, but the more connections that are open, the less bandwidth each one receives. individual connections within a rule A per connection guarantee means that each connection that matches the particular rule is guaranteed a minimum bandwidth. Although weights do in fact guarantee the bandwidth share for specific connections, only a guarantee allows you to specify an absolute bandwidth value. Limits A limit specifies the maximum bandwidth that is assigned to all the connections together. A limit defines a point beyond which connections under a rule are not allocated bandwidth, even if there is unused bandwidth available. Limits can also be defined for the sum of all connections within a rule or for individual connections within a rule. Question 5. Which operating system is NOT supported by VPN-1 SecureClient? A. IPSO 3.9 B. Windows XP SP2 C. Windows 2000 Professional D. RedHat Linux 8.0 E. MacOS X Answer: A Explanation: RedHat 8 is also not currently supported according to the docs, but A is the most correct answer.. http://www.checkpoint.com/products/downloads/vpn-1_clients_datasheet.pdf Question 6. You want to upgrade a SecurePlatform NG with Application Intelligence (AI) R55 Gateway to SecurePlatform NGX R60 via SmartUpdate. Which package is needed in the repository before upgrading? A. SVN Foundation and VPN-1 Express/Pro B. VNP-1 and FireWall-1 C. SecurePlatform NGX R60 D. SVN Founation E. VPN-1 Pro/Express NGX R60 Answer: C Explanation: SmartCenter Upgrade on SecurePlatform R54, R55 and Later Versions Upgrading to NGX R60 over a SecurePlatform operating system requires updating both operating system and software products installed. SecurePlatform users should follow the relevant SecurePlatform upgrade process. The process described in this section will result with an upgrade of all components (Operating System and software packages) in a single upgrade process. No further upgrades are required. Refer to NGX R60 SecurePlatform Guide for additional information. If a situation arises in which a revert to your previous configuration is required refer to "Revert to your Previous Deployment" on page 52 for detailed information. Using a CD ROM The following steps depict how to upgrade SecurePlatform R54 and later versions using a CD ROM drive. 1 Log into SecurePlatform (Expert mode is not necessary). 2 Apply the SecurePlatform NGX R60 upgrade package: # patch add cd. 3 At this point you will be asked to verify the MD5 checksum. 4 Answer the following question: Do you want to create a backup image for automatic revert? Yes/No If you select Yes, a Safe Upgrade will be performed. Safe Upgrade automatically takes a snapshot of the entire system so that the entire system (operating system and installed products) can be restored if something goes wrong during the Upgrade process (for example, hardware incompatibility). If the Upgrade process detects a malfunction, it will automatically revert to the Safe Upgrade image. When the Upgrade process is complete, upon reboot you will be given the option to manually choose to start the SecurePlatform operating system using the upgraded version image or using the image prior to the Upgrade process. Question 7. Exhibit: The exhibit displays the cphaprob state command output from a New Mode High Availability cluster member. Which machine has the highest priority? A. 192.168.1.2, since its number is 2. B. 192.168.1.1, because its number is 1. C. This output does not indicate which machine has the highest priority. D. 192.168.1.2, because its stats is active Answer: B Reference: ClusterXL.pdf page 76 Question 8. Exhibit: ITCertKeys tries to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. ITCertKeys sees the screen displayed in the exhibit. What is the problem? A. Jack must enable directional_match(true) in the object_5_0.c file on SmartCenter server. B. Jack must enable Advanced Routing on each Security Gateway C. Jack must enable VPN Directional Match on the VPN Advanced screen, in Global properties. D. Jack must enable a dynamic-routing protocol, such as OSPF, on the Gateways. E. Jack must enable VPN Directional Match on the gateway object's VPN tab. Answer: C Reference: VPN.pdf page 145 Question 9. Where can a Security Administator adjust the unit of measurement (bps, Kbps or Bps), for Check Point QoS bandwidth? A. Global Properties B. QoS Class objects C. Check Point gateway object properties D. $CPDIR/conf/qos_props.pf E. Advanced Action options in each QoS rule. Answer: A Reference: R60 CheckPointQoS.pdf page 94 Question 10. ITCertKeys is the Security Administrator for ITCertKeys.com. ITCertKeys.com FTP servers have old hardware and software. Certain FTP commands cause the FTP servers to malfunction. Upgrading the FTP Servers is not an option this time. Which of the following options will allow ITCertKeys to control which FTP commands pass through the Security Gateway protecting the FTP servers? A. Global Properties->Security Server ->Security Server->Allowed FTP Commands B. SmartDefense->Application Intelligence->FTP Security Server C. Rule Base->Action Field->Properties D. Web Intelligence->Application Layer->FTP Settings E. FTP Service Object->Advanced->Blocked FTP Commands Answer: B Reference: Surf to that location in Smart Dashboard
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.