You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.A . Inspect/Bypass B. Inspect/Prevent C. Prevent/Bypass D. Detect/BypassView AnswerAnswer: A
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....
Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265 B. TCP port 265 C. UDP port 256 D. TCP port 256View AnswerAnswer: D Explanation: Synchronization works in two modes: Full Sync transfers all Security Gateway kernel table information from...
Which command collects diagnostic data for analyzing customer setup remotely?
Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...
What are the different command sources that allow you to communicate with the API server?
What are the different command sources that allow you to communicate with the API server?A . SmartView Monitor, API_cli Tool, Gaia CLI, Web Services B. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services C. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services D. API_cli Tool, Gaia CLI, Web...
In R81, how do you manage your Mobile Access Policy?
In R81, how do you manage your Mobile Access Policy?A . Through the Unified Policy B. Through the Mobile Console C. From SmartDashboard D. From the Dedicated Mobility TabView AnswerAnswer: A
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.A . SecureID B. SecurID C. Complexity D. TacAcsView AnswerAnswer: B
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
What is the limitation of employing Sticky Decision Function?
What is the limitation of employing Sticky Decision Function?A . With SDF enabled, the involved VPN Gateways only supports IKEv1 B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF C. With SDF enabled, only ClusterXL in legacy mode is supported D. With SDF enabled, you can...
What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address> B. add hostname <New HostName> ip-address <ip address> C. set host name <New...