Correct Answer: cpconfig
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Checkpoint Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Checkpoint Security MCQ Questions
Which tool can be used to monitor the Packets?
Jeremy has to create 3 site-to-site VPNs. NJ is the central site and the remote sites are Bangalore and Dubai. Bangalore and Dubai can communicate with each other.
Which VPN topologies should he use to achieve it?
Which feature will you use to manage the different security policies for different gateways when you are managing more than one Enforcement modules from the SmartCenter?
Where will you place the Stealth rule in the Rule Base?
Which SmartConsole application will you use when you want to implement a new security policy for your network?
Which is used to edit the Log file size switch settings?
Different modes in High-Availability (HA)?
Which command is used to check the VPN-1 version on Gateway?
Which is Security servers?
What rule will Mary create in the rule base to implement the authentication when she wants to implement client authentication for an Internet_User Group for HTTP service?