Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D

February 22, 2020 No Comments READ MORE +

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstatB . fw ctl affinity Cl Ca Cr CvC . fw ctl multik statD . cpinfoView AnswerAnswer: B

February 21, 2020 No Comments READ MORE +

Post-Automatic/Manual NAT rules

Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A

February 21, 2020 No Comments READ MORE +

What is the mechanism behind Threat Extraction?

What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...

February 21, 2020 No Comments READ MORE +

What are the three components for Check Point Capsule?

What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule ConnectB . Capsule Workspace, Capsule Cloud, Capsule ConnectC . Capsule Workspace, Capsule Docs, Capsule ConnectD . Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/products-solutions/mobile-security/check-point-capsule/

February 21, 2020 No Comments READ MORE +

Which command will allow you to see the interface status?

Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm

February 20, 2020 No Comments READ MORE +

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logdB . fwdC . fwmD . cpdView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

February 20, 2020 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D

February 20, 2020 No Comments READ MORE +

Identify the API that is not supported by Check Point currently.

Identify the API that is not supported by Check Point currently.A . R80 Management APIĀ­B . Identity Awareness Web Services APIC . Open REST APID . OPSEC SDKView AnswerAnswer: C

February 20, 2020 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D

February 19, 2020 No Comments READ MORE +