Connections to the Check Point R81 Web API use what protocol?
Connections to the Check Point R81 Web API use what protocol?A . HTTPS B. RPC C. VPN D. SICView AnswerAnswer: A
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?A . Stateful Mode B. VPN Routing Mode C. Wire Mode D. Stateless ModeView AnswerAnswer: C Explanation: Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully...
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A
Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.A . User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiationsView AnswerAnswer: C Explanation: Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level....
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_import B. cpconfig C. fwm dbimport -p <export file> D. cpinfo CrecoverView AnswerAnswer: A
Which is NOT an example of a Check Point API?
Which is NOT an example of a Check Point API?A . Gateway API B. Management API C. OPSC SDK D. Threat Prevention APIView AnswerAnswer: A
What command will you use to provide such information to manager?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?A . fw accel stat B. fwaccel stat C. fw acces stats D. fwaccel statsView AnswerAnswer: B