Which Policy should the administrator install after Publishing the changes?
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?A . The Access Control and Threat Prevention Policies. B. The Access Control Policy. C. The Access Control & HTTPS Inspection Policy....
In ____________ NAT, the ____________ is translated.
In ____________ NAT, the ____________ is translated.A . Hide; source B. Static; source C. Simple; source D. Hide; destinationView AnswerAnswer: A
Where can administrator edit a list of trusted SmartConsole clients?
Where can administrator edit a list of trusted SmartConsole clients?A . cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server. B. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings > Permissions...
Which of the following situations would not require a new license to be generated and installed?
Which of the following situations would not require a new license to be generated and installed?A . The Security Gateway is upgraded. B. The existing license expires. C. The license is upgraded. D. The IP address of the Security Management or Security Gateway has changed.View AnswerAnswer: A
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?A . Publish changes B. Save changes C. Install policy D. Install databaseView AnswerAnswer: C
What is the MOST likely reason?
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?A . Identity Awareness is not enabled. B. Log Trimming is enabled. C. Logging has disk space issues D. Content Awareness is...
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?A . AD Query B. Terminal Servers Endpoint Identity Agent C. Endpoint Identity Agent and Browser-Based Authentication D. RADIUS and Account LogonView AnswerAnswer: C Explanation: Endpoint Identity...
DLP and Geo Policy are examples of what type of Policy?
DLP and Geo Policy are examples of what type of Policy?A . Inspection Policies B. Shared Policies C. Unified Policies D. Standard PoliciesView AnswerAnswer: B Explanation: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/137006
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?A . Security Gateway IP-address cannot be changed without re-establishing the trust B. The Security Gateway name cannot be changed in command line without re-establishing trust C. The Security Management Server name cannot...
What is the main objective when using Application Control?
What is the main objective when using Application Control?A . To filter out specific content. B. To assist the firewall blade with handling traffic. C. To see what users are doing. D. Ensure security and privacy of information.View AnswerAnswer: A Explanation: https://www.checkpoint.com/cyber-hub/network-security/what-is-application-control/