Connections to the Check Point R81 Web API use what protocol?

Connections to the Check Point R81 Web API use what protocol?A . HTTPS B. RPC C. VPN D. SICView AnswerAnswer: A

September 16, 2022 No Comments READ MORE +

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...

September 16, 2022 No Comments READ MORE +

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful Mode B. VPN Routing Mode C. Wire Mode D. Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...

September 16, 2022 No Comments READ MORE +

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...

September 16, 2022 No Comments READ MORE +

Advanced Security Checkups can be easily conducted within:

Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A

September 16, 2022 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D

September 15, 2022 No Comments READ MORE +

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....

September 15, 2022 No Comments READ MORE +

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_import B. cpconfig C. fwm dbimport -p <export file> D. cpinfo CrecoverView AnswerAnswer: A

September 14, 2022 No Comments READ MORE +

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A

September 14, 2022 No Comments READ MORE +

What command will you use to provide such information to manager?

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?A . fw accel stat B. fwaccel stat C. fw acces stats D. fwaccel statsView AnswerAnswer: B

September 14, 2022 No Comments READ MORE +