Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstatB . fw ctl affinity Cl Ca Cr CvC . fw ctl multik statD . cpinfoView AnswerAnswer: B
Post-Automatic/Manual NAT rules
Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4B . 1, 4, 2, 3C . 3, 1, 2, 4D . 4, 3, 1, 2View AnswerAnswer: A
What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule ConnectB . Capsule Workspace, Capsule Cloud, Capsule ConnectC . Capsule Workspace, Capsule Docs, Capsule ConnectD . Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/products-solutions/mobile-security/check-point-capsule/
Which command will allow you to see the interface status?
Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?A . logdB . fwdC . fwmD . cpdView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638
What command would you use to restore this backup?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backupB . import backupC . cp_mergeD . migrate importView AnswerAnswer: D
Identify the API that is not supported by Check Point currently.
Identify the API that is not supported by Check Point currently.A . R80 Management APIĀB . Identity Awareness Web Services APIC . Open REST APID . OPSEC SDKView AnswerAnswer: C
Which two of these Check Point Protocols are used by SmartEvent Processes?
Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D