How can you enable them?

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...

December 18, 2019 No Comments READ MORE +

Which component is NOT part of the SandBlast Mobile solution?

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management DashboardB . GatewayC . Personal User StorageD ....

December 18, 2019 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway APIB . Management APIC . OPSC SDKD . Threat Prevention APIView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

December 18, 2019 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D

December 17, 2019 No Comments READ MORE +

What Factor preclude Secure XL Templating?

What Factor preclude Secure XL Templating?A . Source Port Ranges/Encrypted ConnectionsB . IPSC . ClusterXL in load sharing ModeD . CoreXLView AnswerAnswer: A

December 17, 2019 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191B . 18190C . 8983D . 19009View AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture­overview.pdf

December 15, 2019 No Comments READ MORE +

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?A . One machine, but it needs to be installed using SecurePlatform for compatibility...

December 15, 2019 No Comments READ MORE +

What is true about VRRP implementations?

What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/87911.htm

December 12, 2019 No Comments READ MORE +

What are the three components for Check Point Capsule?

What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule ConnectB . Capsule Workspace, Capsule Cloud, Capsule ConnectC . Capsule Workspace, Capsule Docs, Capsule ConnectD . Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D Explanation: Reference: https://www.checkpoint.com/products-solutions/mobile-security/check-point-capsule/

December 12, 2019 No Comments READ MORE +

Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applicationsB . Prevents or controls access to web sites based on categoryC . Prevents Cloud vulnerability exploitsD . A worldwide collaborative security networkView AnswerAnswer: D

December 12, 2019 No Comments READ MORE +