Which one of the following is true about Threat Emulation?
Which one of the following is true about Threat Emulation?A . Takes less than a second to completeB . Works on MS Office and PDF files onlyC . Always delivers a fileD . Takes minutes to complete (less than 3 minutes)View AnswerAnswer: D
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.A . Accept; redirectB . Accept; dropC . Redirect; dropD . Drop; acceptView AnswerAnswer: D
Which of the following is NOT a valid type of SecureXL template?
Which of the following is NOT a valid type of SecureXL template?A . Accept TemplateB . Deny templateC . Drop TemplateD . NAT TemplateView AnswerAnswer: B
Which 3 types of tracking are available for Threat Prevention Policy?
Which 3 types of tracking are available for Threat Prevention Policy?A . SMS Alert, Log, SNMP alertB . Syslog, None, User-defined scriptsC . None, Log, SyslogD . Alert, SNMP trap, MailView AnswerAnswer: B
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
What is the minimum amount of RAM needed for a Threat Prevention Appliance?A . 6 GBB . 8GB with Gaia in 64-bit modeC . 4 GBD . It depends on the number of software blades enabledView AnswerAnswer: C
response before the peer host is declared ‘down’, you would set the_________?
In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a response before the peer host is declared ‘down’, you would set the_________?A . life sign polling intervalB . life sign timeoutC . life_sign_polling_intervalD . life_sign_timeoutView AnswerAnswer: D Explanation: Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm ?topic=documents/R77/CP_R77_VPN_AdminGuide/14018
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/BypassB . Inspect/PreventC . Prevent/BypassD . Detect/BypassView AnswerAnswer: A
Which of the following is NOT a VPN routing option available in a star community?
Which of the following is NOT a VPN routing option available in a star community?A . To satellites through center only.B . To center, or through the center to other satellites, to Internet and other VPN targets.C . To center and to other satellites through center.D . To center only.View...
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)A . SmartCenter Server cannot reach this Security Gateway.B . There is a blade reporting a problem.C . VPN software blade is reporting a malfunction.D . Security Gateway’s MGNT NIC card is disconnected.View AnswerAnswer: B
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.A . Accept; redirectB . Accept; dropC . Redirect; dropD . Drop; acceptView AnswerAnswer: D