What is the MOST likely reason?
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?A . Identity Awareness is not enabled. B. Log Trimming is enabled. C. Logging has disk space issues D. Content Awareness is...
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?A . Stateful Inspection is limited to Layer 3 visibility, with no Layer 4 to Layer 7 visibility capabilities. B. When it comes to performance, proxies were...
How many users can have read/write access in Gaia Operating System at one time?
How many users can have read/write access in Gaia Operating System at one time?A . One B. Three C. Two D. InfiniteView AnswerAnswer: A Explanation: if another user has r/w access, you need to use "lock database override" or "unlock database" to claim r/w access. Ref: https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/162435
Which tool is used to enable cluster membership on a Gateway?
Which tool is used to enable cluster membership on a Gateway?A . SmartUpdate B. cpconfig C. SmartConsole D. sysconfigView AnswerAnswer: B
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?A . No, it will not work independently. Hit Count will be shown only for...
What is the RFC number that act as a best practice guide for NAT?
What is the RFC number that act as a best practice guide for NAT?A . RFC 1939 B. RFC 1950 C. RFC 1918 D. RFC 793View AnswerAnswer: C Explanation: https://datatracker.ietf.org/doc/html/rfc1918
What is the most recommended installation method for Check Point appliances?
What is the most recommended installation method for Check Point appliances?A . SmartUpdate installation B. DVD media created with Check Point ISOMorphic C. USB media created with Check Point ISOMorphic D. Cloud based installationView AnswerAnswer: C
What is the main difference between Threat Extraction and Threat Emulation?
What is the main difference between Threat Extraction and Threat Emulation?A . Threat Emulation never delivers a file and takes more than 3 minutes to complete B. Threat Extraction always delivers a file and takes less than a second to complete C. Threat Emulation never delivers a file that takes...
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.A . Down B. No Response C. Inactive D. FailedView AnswerAnswer: A