Which software blade does NOT accompany the Threat Prevention policy?
Which software blade does NOT accompany the Threat Prevention policy?A . IPS B. Application Control and URL Filtering C. Threat Emulation D. Anti-virusView AnswerAnswer: B
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?A . SND is a feature to accelerate multiple SSL VPN connections B. SND is an alternative to IPSec Main Mode, using only 3 packets C. SND is used to distribute packets among Firewall instances D....
In the Check Point Security Management Architecture, which component(s) can store logs?
In the Check Point Security Management Architecture, which component(s) can store logs?A . SmartConsole B. Security Management Server and Security Gateway C. Security Management Server D. SmartConsole and Security Management ServerView AnswerAnswer: B
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.A . Formal; corporate B. Local; formal C. Local; central D. Central; localView AnswerAnswer: D
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?A . Security Gateway IP-address cannot be changed without re-establishing the trust B. The Security Gateway name cannot be changed in command line without re-establishing trust C. The Security Management Server name cannot...
Which GUI tool can be used to view and apply Check Point licenses?
Which GUI tool can be used to view and apply Check Point licenses?A . cpconfig B. Management Command Line C. SmartConsole D. SmartUpdateView AnswerAnswer: D Explanation: SmartUpdate GUI is the recommended way of managing licenses.
How can you fix this?
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you...
Fill in the blank Backup and restores can be accomplished through
Fill in the blank Backup and restores can be accomplished throughA . SmartUpdate, SmartBackup. or SmartConsole B. WebUI. CLI. or SmartUpdate C. CLI. SmartUpdate, or SmartBackup D. SmartConsole, WebUI. or CLIView AnswerAnswer: D
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . in R80, IPS is managed by the Threat Prevention Policy B. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict C. in R80, IPS Exceptions cannot be attached to “all rules” D. in R80, the GeoPolicy...
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?A . Name of the application, identity of the user, and identity of the machine B. Identity of the machine, username, and certificate C. Network location, identity of a user, and identity of a machine...