Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?

Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?A . IPS bladeB . IPSEC VPN BladeC . Identity Awareness BladeD . Firewall BladeView AnswerAnswer: A

January 19, 2024 No Comments READ MORE +

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?A . Anti-BotB . None - both Anti-Virus and Anti-Bot are required for thisC . Anti-VirusD . None - both URL Filtering and Anti-Virus are required...

January 18, 2024 No Comments READ MORE +

How could you tune the profile in order to lower the CPU load still maintaining security at good level?

CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings. The following Threat Prevention Profile has been created. How could you tune the profile in order to lower the CPU load still maintaining security at good...

January 18, 2024 No Comments READ MORE +

Fill in the blank: The _____ feature allows administrators to share a policy with other policy

Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.A . Concurrent policy packagesB . Concurrent policiesC . Global PoliciesD . Shared policiesView AnswerAnswer: D Explanation: "The Shared Policies section in the Security Policies shows the policies that are not in a Policy...

January 18, 2024 No Comments READ MORE +

Which command shows the installed licenses?

Which command shows the installed licenses?A . cplic printB . print cplicC . fwlic printD . show licensesView AnswerAnswer: A

January 18, 2024 No Comments READ MORE +

The ______ software blade package uses CPU-level and OS-level sandboxing in order to

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.A . Next Generation Threat PreventionB . Next Generation Threat EmulationC . Next Generation Threat ExtractionD . Next Generation FirewallView AnswerAnswer: B

January 18, 2024 No Comments READ MORE +

Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?

Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?A . AD QueryB . Terminal Servers Endpoint Identity AgentC . Endpoint Identity Agent and Browser-Based AuthenticationD . RADIUS and Account LogonView AnswerAnswer: C Explanation: Endpoint Identity...

January 17, 2024 No Comments READ MORE +

To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?

To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?A . ProtectionsB . IPS ProtectionsC . ProfilesD . ThreatWikiView AnswerAnswer: B

January 17, 2024 No Comments READ MORE +

In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)

In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)A . SmartConsole and WebUI on the Security Management Server.B . SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed.C . Command line of the Security Management Server or mgmt_cli.exe...

January 17, 2024 No Comments READ MORE +

What are those forms?

Check Point licenses come in two forms. What are those forms?A . Central and Local.B . Access Control and Threat Prevention.C . On-premise and Public Cloud.D . Security Gateway and Security Management.View AnswerAnswer: A

January 17, 2024 No Comments READ MORE +