Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...
Which statement is TRUE of anti-spoofing?
Which statement is TRUE of anti-spoofing?A . Anti-spoofing is not needed when IPS software blade is enabled B. It is more secure to create anti-spoofing groups manually C. It is BEST Practice to have anti-spoofing groups in sync with the routing table D. With dynamic routing enabled, anti-spoofing groups are...
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?A . Application Control B. Threat Emulation C. Anti-Virus D. Advanced Networking BladeView AnswerAnswer: B
To make John’s changes available to other administrators, and to save the database before installing a policy, what must John do?
John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John’s changes available to other administrators, and to save the database before installing a policy, what must John...
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security GatewayA . True, CLI is the prefer method for Licensing B. False, Central License are handled via Security Management Server C. False, Central License are installed via Gaia on Security Gateways D....
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
Fill in the blank: An identity server uses a ___________ for user authentication.
Fill in the blank: An identity server uses a ___________ for user authentication.A . Shared secret B. Certificate C. One-time password D. TokenView AnswerAnswer: A
How would you determine the software version from the CLI?
How would you determine the software version from the CLI?A . fw ver B. fw stat C. fw monitor D. cpinfoView AnswerAnswer: A
Fill in the blank: ____________ is the Gaia command that turns the server off.
Fill in the blank: ____________ is the Gaia command that turns the server off.A . sysdown B. exit C. halt D. shut-downView AnswerAnswer: C
Which statement is true?
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?A . Manual NAT can offer more flexibility than Automatic NAT. B. Dynamic Network Address Translation (NAT) Overloading can offer more flexibility than Port Address Translation. C. Dynamic NAT with Port Address...