The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?

The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?A . Stateful Inspection is limited to Layer 3 visibility, with no Layer 4 to Layer 7 visibility capabilities.B . When it comes to performance, proxies were...

January 8, 2024 No Comments READ MORE +

Fill in the blanks: Gaia can be configured using _______ the ________.

Fill in the blanks: Gaia can be configured using _______ the ________.A . Command line interface; WebUIB . Gaia Interface; GaiaUIC . WebUI; Gaia InterfaceD . GaiaUI; command line interfaceView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Configuring-Gaia-for-the-First-Time.htm?tocpath=Configuring%20Gaia%20for%20the%20First%20Time%7C_____0

January 8, 2024 No Comments READ MORE +

Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.

Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.A . Formal; corporateB . Local; formalC . Local; centralD . Central; localView AnswerAnswer: D

January 8, 2024 No Comments READ MORE +

Which part of SmartConsole allows administrators to add, edit delete, and clone objects?

Which part of SmartConsole allows administrators to add, edit delete, and clone objects?A . Object BrowserB . Object EditorC . Object NavigatorD . Object ExplorerView AnswerAnswer: D

January 8, 2024 No Comments READ MORE +

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?A . Manage and Command LineB . Logs and MonitorC . Security PoliciesD . Gateway and ServersView AnswerAnswer: A Explanation:

January 8, 2024 No Comments READ MORE +

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?A . Application ControlB . Data AwarenessC . Identity AwarenessD . Threat EmulationView AnswerAnswer: C

January 8, 2024 No Comments READ MORE +

Security Zones do no work with what type of defined rule?

Security Zones do no work with what type of defined rule?A . Application Control ruleB . Manual NAT ruleC . IPS bypass ruleD . Firewall ruleView AnswerAnswer: B Explanation: https://community.checkpoint.com/t5/Management/Workaround-for-manual-NAT-when-security-zones-are-used/td-p/9915

January 8, 2024 No Comments READ MORE +

Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?

Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?A . host name myHost12 ip-address 10.50.23.90B . mgmt add host name ip-address 10.50.23.90C . add host name emailserver1 ip-address 10.50.23.90D . mgmt add host name emailserver1 ip-address 10.50.23.90View AnswerAnswer: D

January 8, 2024 No Comments READ MORE +

What is the main difference between Threat Extraction and Threat Emulation?

What is the main difference between Threat Extraction and Threat Emulation?A . Threat Emulation never delivers a file and takes more than 3 minutes to completeB . Threat Extraction always delivers a file and takes less than a second to completeC . Threat Emulation never delivers a file that takes...

January 7, 2024 No Comments READ MORE +

What are the types of Software Containers?

What are the types of Software Containers?A . Smart Console, Security Management, and Security GatewayB . Security Management, Security Gateway, and Endpoint SecurityC . Security Management, Log & Monitoring, and Security PolicyD . Security Management, Standalone, and Security GatewayView AnswerAnswer: B

January 7, 2024 No Comments READ MORE +