How do you manage Gaia?
How do you manage Gaia?A . Through CLI and WebUI B. Through CLI only C. Through SmartDashboard only D. Through CLI, WebUI, and SmartDashboardView AnswerAnswer: D
A SAM rule Is implemented to provide what function or benefit?
A SAM rule Is implemented to provide what function or benefit?A . Allow security audits. B. Handle traffic as defined in the policy. C. Monitor sequence activity. D. Block suspicious activity.View AnswerAnswer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMo nitoring_AdminGuide/Topics-LMG/Monitoring-Suspicious-Activity-Rules.htm
What will be the result of a verification of the policy from SmartConsole?
Examine the sample Rule Base. What will be the result of a verification of the policy from SmartConsole?A . No errors or Warnings B. Verification Error. Empty Source-List in Rule 5 (Mail Inbound) C. Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access) D. Verification Error. Rule 7...
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?A . AD Query B. Terminal Servers Endpoint Identity Agent C. Endpoint Identity Agent and Browser-Based Authentication D. RADIUS and Account LogonView AnswerAnswer: C Explanation: Endpoint Identity...
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.A . Upgrade the software version B. Open WebUI C. Open SSH D. Open service request with Check Point Technical SupportView AnswerAnswer: C
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?A . IPS B. Anti-Virus C. Anti-Spam D. Anti-botView AnswerAnswer: A
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?A . SmartConsole installed device B. Check Point user center C. Security Management Server D. Security GatewayView AnswerAnswer: C
What is considered part of the zone?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?A . The zone is based on the network topology and determined according to where the interface leads to. B. Security Zones are not supported by Check...
What is the best sync method in the ClusterXL deployment?
What is the best sync method in the ClusterXL deployment?A . Use 1 cluster + 1st sync B. Use 1 dedicated sync interface C. Use 3 clusters + 1st sync + 2nd sync + 3rd sync D. Use 2 clusters + 1st sync + 2nd syncView AnswerAnswer: B
Fill in the blank: ____________ is the Gaia command that turns the server off.
Fill in the blank: ____________ is the Gaia command that turns the server off.A . sysdown B. exit C. halt D. shut-downView AnswerAnswer: C