What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?A . Source address, Destination address, Source port, Destination port, ProtocolB . Source MAC address, Destination MAC address, Source port, Destination port, ProtocolC . Source address, Destination address, Source port, Destination portD . Source address,...
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic IDB . RADIUSC . Username and PasswordD . CertificateView AnswerAnswer: A
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote UserB . Check Point Capsule WorkspaceC . Check Point Mobile Web PortalD . Check Point Capsule RemoteView AnswerAnswer: C Explanation: Check Point Mobile Web...
Where you can see and search records of action done by R81 SmartConsole administrators?
Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active logB . In the Logs & Monitor view, select “Open Audit Log View”C . In SmartAuditLog ViewD . In Smartlog, all logsView AnswerAnswer: B Explanation: The Audit Log is a...
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C Explanation: Sticky Decision Function (SDF) is required to prevent asymmetric routing in an Active-Active cluster. Asymmetric routing occurs when...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client InfoB . SecuRemoteC . Check Point ProtectD . Check Point Capsule CloudView AnswerAnswer: C Explanation: Check Point Protect is a lightweight app that can...
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port OverflowB . Local Interface SpoofingC . Suspicious Activity MonitoringD . Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009B . TCP Port 18190C . TCP Port 18191D . TCP Port...