SmartEvent does NOT use which of the following procedures to identity events:

SmartEvent does NOT use which of the following procedures to identity events:A . Matching a log against each event definitionB . Create an event candidateC . Matching a log against local exclusionsD . Matching a log against global exclusionsView AnswerAnswer: C Explanation: The procedure that SmartEvent does not use to...

March 31, 2024 No Comments READ MORE +

Which of the following commands is used to monitor cluster members?

Which of the following commands is used to monitor cluster members?A . cphaprob stateB . cphaprob statusC . cphaprobD . cluster stateView AnswerAnswer: A Explanation: The command that is used to monitor cluster members is cphaprob state. This command shows the state of each cluster member (Active, Standby, Down, etc.)...

March 31, 2024 No Comments READ MORE +

Fill in the blank: Service blades must be attached to a ______________.

Fill in the blank: Service blades must be attached to a ______________.A . Security GatewayB . Management containerC . Management serverD . Security Gateway containerView AnswerAnswer: A Explanation: Service blades must be attached to a Security Gateway. A Security Gateway is a device that enforces security policies on traffic that...

March 31, 2024 No Comments READ MORE +

What is the main difference between Threat Extraction and Threat Emulation?

What is the main difference between Threat Extraction and Threat Emulation?A . Threat Emulation never delivers a file and takes more than 3 minutes to completeB . Threat Extraction always delivers a file and takes less than a second to completeC . Threat Emulation never delivers a file that takes...

March 31, 2024 No Comments READ MORE +

Which deployment adds a Security Gateway to an existing environment without changing IP routing?

Which deployment adds a Security Gateway to an existing environment without changing IP routing?A . DistributedB . Bridge ModeC . RemoteD . StandaloneView AnswerAnswer: B Explanation: The answer is B because bridge mode deployment adds a Security Gateway to an existing environment without changing IP routing. Bridge mode is a...

March 31, 2024 No Comments READ MORE +

Which of the following is NOT a component of Check Point Capsule?

Which of the following is NOT a component of Check Point Capsule?A . Capsule DocsB . Capsule CloudC . Capsule EnterpriseD . Capsule WorkspaceView AnswerAnswer: C Explanation: The components of Check Point Capsule are Capsule Docs, Capsule Cloud, and Capsule Workspace123. There is no Capsule Enterprise component. Capsule Docs protects...

March 31, 2024 No Comments READ MORE +

Which of the following processes can only be seen on a Management Server?

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?A . fwdB . fwmC . cpdD . cpwdView AnswerAnswer: B Explanation: The fwm process is responsible for managing the communication...

March 31, 2024 No Comments READ MORE +

What are the steps to configure the HTTPS Inspection Policy?

What are the steps to configure the HTTPS Inspection Policy?A . Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboardB . Go to Application&url filtering blade > Advanced > Https Inspection > PolicyC . Go to Manage&Settings > Blades > HTTPS Inspection > PolicyD . Go to...

March 31, 2024 No Comments READ MORE +

Which Threat Prevention Profile is not included by default in R80 Management?

Which Threat Prevention Profile is not included by default in R80 Management?A . Basic C Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performanceB . Optimized C Provides excellent protection for common network products and protocols against recent or popular attacksC ....

March 31, 2024 No Comments READ MORE +

What is the possible explanation for this?

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base. What is the possible explanation for this?A . DNS Rule is using one of the new feature of R80...

March 30, 2024 No Comments READ MORE +