What Check Point technologies deny or permit network traffic?

What Check Point technologies deny or permit network traffic?A . Application Control, DLP B. Packet Filtering, Stateful Inspection, Application Layer Firewall. C. ACL, SandBlast, MPT D. IPS, Mobile Threat ProtectionView AnswerAnswer: B

November 13, 2022 No Comments READ MORE +

Fill in the blanks: The _______ collects logs and sends them to the _______.

Fill in the blanks: The _______ collects logs and sends them to the _______.A . Log server; Security Gateway B. Log server; security management server C. Security management server; Security Gateway D. Security Gateways; log serverView AnswerAnswer: D Explanation: Gateways send their logs to the log server.

November 13, 2022 No Comments READ MORE +

Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?

Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?A . Save Policy B. Install Database C. Save session D. Install PolicyView AnswerAnswer: D

November 13, 2022 No Comments READ MORE +

What are those forms?

Check Point licenses come in two forms. What are those forms?A . Central and Local. B. Access Control and Threat Prevention. C. On-premise and Public Cloud. D. Security Gateway and Security Management.View AnswerAnswer: A

November 13, 2022 No Comments READ MORE +

What does the pen-symbol in the left column mean?

View the rule below. What does the pen-symbol in the left column mean?A . Those rules have been published in the current session. B. Rules have been edited by the logged in administrator, but the policy has not been published yet. C. Another user has currently locked the rules for...

November 13, 2022 No Comments READ MORE +

What is the possible explanation for this?

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base. What is the possible explanation for this?A . DNS Rule is using one of the new feature of R80...

November 13, 2022 No Comments READ MORE +

What is the name of that technology?

URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?A . WebCheck B. UserCheck C. Harmony Endpoint D. URL categorizationView AnswerAnswer: B Explanation: UserCheck alerts users while attemping to browse a suspicious/blocked or otherwise policy-limited website through a...

November 13, 2022 No Comments READ MORE +

Which Smartcenter should be connected to for making changes?

John is using Management HA. Which Smartcenter should be connected to for making changes? A. secondary Smartcenter B. active Smartcenter C. connect virtual IP of Smartcenter HA D. primary SmartcenterView AnswerAnswer: B

November 13, 2022 No Comments READ MORE +

What is the default shell of Gaia CLI?

What is the default shell of Gaia CLI?A . clish B. Monitor C. Read-only D. BashView AnswerAnswer: A Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/CLI-Reference-_interface_.htm

November 13, 2022 No Comments READ MORE +

With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?

With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?A . The complete communication is sent for inspection. B. The IP address of the source machine. C. The end user credentials. D. The host portion of the URL.View AnswerAnswer: D Explanation:...

November 13, 2022 No Comments READ MORE +