How do you manage Gaia?
How do you manage Gaia?A . Through CLI and WebUIB . Through CLI onlyC . Through SmartDashboard onlyD . Through CLI, WebUI, and SmartDashboardView AnswerAnswer: A
In which scenario is it a valid option to transfer a license from one hardware device to another?
In which scenario is it a valid option to transfer a license from one hardware device to another?A . From a 4400 Appliance to a 2200 ApplianceB . From a 4400 Appliance to an HP Open ServerC . From an IBM Open Server to an HP Open ServerD . From...
Name one limitation of using Security Zones in the network?
Name one limitation of using Security Zones in the network?A . Security zones will not work in Automatic NAT rulesB . Security zone will not work in Manual NAT rulesC . Security zones will not work in firewall policy layerD . Security zones cannot be used in network topologyView AnswerAnswer:...
Which GUI tool can be used to view and apply Check Point licenses?
Which GUI tool can be used to view and apply Check Point licenses?A . cpconfigB . Management Command LineC . SmartConsoleD . SmartUpdateView AnswerAnswer: D Explanation: SmartUpdate GUI is the recommended way of managing licenses.
What tool can you use to block this traffic?
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?A . Anti-Bot protectionB . Anti-Malware protectionC...
What Check Point technologies deny or permit network traffic?
What Check Point technologies deny or permit network traffic?A . Application Control, DLPB . Packet Filtering, Stateful Inspection, Application Layer Firewall.C . ACL, SandBlast, MPTD . IPS, Mobile Threat ProtectionView AnswerAnswer: B
Which path below is available only when CoreXL is enabled?
Which path below is available only when CoreXL is enabled?A . Slow pathB . Firewall pathC . Medium pathD . Accelerated pathView AnswerAnswer: C
Fill in the blank Backup and restores can be accomplished through
Fill in the blank Backup and restores can be accomplished throughA . SmartUpdate, SmartBackup. or SmartConsoleB . WebUI. CLI. or SmartUpdateC . CLI. SmartUpdate, or SmartBackupD . SmartConsole, WebUI. or CLIView AnswerAnswer: D
What is NOT an advantage of Packet Filtering?
What is NOT an advantage of Packet Filtering?A . Application IndependenceB . High PerformanceC . ScalabilityD . Low Security and No Screening above Network LayerView AnswerAnswer: D
Which of the following is NOT a component of Check Point Capsule?
Which of the following is NOT a component of Check Point Capsule?A . Capsule DocsB . Capsule CloudC . Capsule EnterpriseD . Capsule WorkspaceView AnswerAnswer: C