정답: Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
Reference: http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManagement_AdminGuide.pdf? HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf
Question No : 5
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
정답:
Question No : 6
Which of the following statements is TRUE about R80 management plug-ins?
정답:
Question No : 7
Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration.
정답:
Question No : 8
Tom has been tasked to install Check Point R80 in a distributed deployment.
Before Tom installs the systems this way, how many machines will be need if he does NOT include a SmartConsole machine in his calculations?
정답:
Question No : 9
You are working with multiple Security Gateways enforcing an extensive number of rules.
To simplify security administration, which action would you choose?
정답:
Question No : 10
Fill in the blank: The R80 utility fw monitoris used to troubleshoot __________.
정답:
Question No : 11
Fill in the blank: The tool ___________ generates a R80 Security Gateway configuration report.
정답:
Question No : 12
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
정답:
Question No : 13
The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _______.
정답:
Question No : 14
In which case is a Sticky Decision Function relevant?
정답:
Question No : 15
In Gaia, if one is unsure about a possible command, what command lists all possible commands.