What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50%B . 75%C . 80%D . 15%View AnswerAnswer: D
Which of the following authentication methods ARE NOT used for Mobile Access?
Which of the following authentication methods ARE NOT used for Mobile Access?A . RADIUS serverB . Username and password (internal, LDAP)C . SecurIDD . TACACS+View AnswerAnswer: D
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
On R81.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:A . 18210B . 18184C . 257D . 18191View AnswerAnswer: B
CoreXL is supported when one of the following features is enabled:
CoreXL is supported when one of the following features is enabled:A . Route-based VPNB . IPSC . IPv6D . Overlapping NATView AnswerAnswer: B Explanation: CoreXL does not support Check Point Suite with these features:
What is true about VRRP implementations?
What is true about VRRP implementations?A . VRRP membership is enabled in cpconfigB . VRRP can be used together with ClusterXL, but with degraded performanceC . You cannot have a standalone deploymentD . You cannot have different VRIDs in the same physical networkView AnswerAnswer: C
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureIDB . SecurIDC . ComplexityD . TacAcsView AnswerAnswer: B
Which view is NOT a valid CPVIEW view?
Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?A . SynchronizedB . Never been synchronizedC . LaggingD . CollisionView AnswerAnswer: D
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malwareB . Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control CentersC . Anti-Bot is the only...