The installation of a package via SmartConsole CANNOT be applied on
Which of the following cannot be configured in an Access Role Object?
The verified answer is D) Time.
Networks: IP addresses or network objects that define the source or destination of the traffic.
Machines: Specific hosts or machine groups that are identified by their MAC addresses or certificates.
Users: Specific users or user groups that are authenticated by one or more identity sources, such as Active Directory, LDAP, or Identity Awareness.
LDAP group vs Access role objects - Check Point CheckMates3
What ports are used for SmartConsole to connect to the Security Management Server?
The correct answer is C) CPM (19009), CPMI (18190) https (443).
CPM (19009): This port is used for the communication between the SmartConsole client and the Check Point Management (CPM) process on the Security Management Server. The CPM process handles the database operations and the policy installation.
CPMI (18190): This port is used for the communication between the SmartConsole client and the Check Point Management Interface (CPMI) process on the Security Management Server. The CPMI process handles the authentication and encryption of the SmartConsole sessions.
https (443): This port is used for the communication between the SmartConsole client and the web server on the Security Management Server. The web server provides the SmartConsole GUI and the SmartConsole extensions.
The other options are incorrect because they either include ports that are not used by SmartConsole or omit ports that are used by SmartConsole.
After upgrading the primary security management server from R80.40 to R81.10 Bob wants to use the central deployment in SmartConsole R81.10 for the first time. How many installations (e.g. Jumbo Hotfix, Hotfixes or Upgrade Packages) can run of such at the same time:
According to the Check Point R81.20 documentation, the central deployment feature allows you to install up to 10 packages simultaneously on multiple gateways1.
Reference
1:Check Point R81.20 Administration Guide, page 35.
Which Identity Source(s) should be selected in Identity Awareness Tot when there is a requirement for a higher level of security for sensitive servers?
Marjory
6 days agoRuby
14 days agoShayne
20 days agoEnola
1 months agoMozell
1 months agoTrina
1 months agoLeslie
2 months agoKimberlie
3 months agoJeniffer
4 months agoJamal
4 months agoOwen
4 months agoCaren
4 months agoNobuko
4 months agoJosephine
5 months agoYuonne
5 months ago