SmartEvent does NOT use which of the following procedures to identity events:
SmartEvent does NOT use which of the following procedures to identity events:A . Matching a log against each event definitionB . Create an event candidateC . Matching a log against local exclusionsD . Matching a log against global exclusionsView AnswerAnswer: C Explanation: The procedure that SmartEvent does not use to...
Which of the following commands is used to monitor cluster members?
Which of the following commands is used to monitor cluster members?A . cphaprob stateB . cphaprob statusC . cphaprobD . cluster stateView AnswerAnswer: A Explanation: The command that is used to monitor cluster members is cphaprob state. This command shows the state of each cluster member (Active, Standby, Down, etc.)...
Fill in the blank: Service blades must be attached to a ______________.
Fill in the blank: Service blades must be attached to a ______________.A . Security GatewayB . Management containerC . Management serverD . Security Gateway containerView AnswerAnswer: A Explanation: Service blades must be attached to a Security Gateway. A Security Gateway is a device that enforces security policies on traffic that...
What is the main difference between Threat Extraction and Threat Emulation?
What is the main difference between Threat Extraction and Threat Emulation?A . Threat Emulation never delivers a file and takes more than 3 minutes to completeB . Threat Extraction always delivers a file and takes less than a second to completeC . Threat Emulation never delivers a file that takes...
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Which deployment adds a Security Gateway to an existing environment without changing IP routing?A . DistributedB . Bridge ModeC . RemoteD . StandaloneView AnswerAnswer: B Explanation: The answer is B because bridge mode deployment adds a Security Gateway to an existing environment without changing IP routing. Bridge mode is a...
Which of the following is NOT a component of Check Point Capsule?
Which of the following is NOT a component of Check Point Capsule?A . Capsule DocsB . Capsule CloudC . Capsule EnterpriseD . Capsule WorkspaceView AnswerAnswer: C Explanation: The components of Check Point Capsule are Capsule Docs, Capsule Cloud, and Capsule Workspace123. There is no Capsule Enterprise component. Capsule Docs protects...
Which of the following processes can only be seen on a Management Server?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?A . fwdB . fwmC . cpdD . cpwdView AnswerAnswer: B Explanation: The fwm process is responsible for managing the communication...
What are the steps to configure the HTTPS Inspection Policy?
What are the steps to configure the HTTPS Inspection Policy?A . Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboardB . Go to Application&url filtering blade > Advanced > Https Inspection > PolicyC . Go to Manage&Settings > Blades > HTTPS Inspection > PolicyD . Go to...
Which Threat Prevention Profile is not included by default in R80 Management?
Which Threat Prevention Profile is not included by default in R80 Management?A . Basic C Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performanceB . Optimized C Provides excellent protection for common network products and protocols against recent or popular attacksC ....
What is the possible explanation for this?
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base. What is the possible explanation for this?A . DNS Rule is using one of the new feature of R80...