Which one is NOT correct?

There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?A . Using Web Services B. Using Mgmt_cli tool C. Using CLISH D. Using SmartConsole GUI console E. Events are collected with SmartWorkflow from Trouble Ticket systemsView AnswerAnswer: E

January 25, 2023 No Comments READ MORE +

Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applications B. Prevents or controls access to web sites based on category C. Prevents Cloud vulnerability exploits D. A worldwide collaborative security networkView AnswerAnswer: D

January 25, 2023 No Comments READ MORE +

What has to be taken into consideration when configuring Management HA?

What has to be taken into consideration when configuring Management HA?A . The Database revisions will not be synchronized between the management servers B. SmartConsole must be closed prior to synchronized changes in the objects database C. If you wanted to use Full Connectivity Upgrade, you must change the Implied...

January 25, 2023 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D

January 25, 2023 No Comments READ MORE +

In R81 spoofing is defined as a method of:

In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...

January 24, 2023 No Comments READ MORE +

Which application would you use?

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +

Advanced Security Checkups can be easily conducted within:

Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A

January 24, 2023 No Comments READ MORE +

Session unique identifiers are passed to the web api using which http header option?

Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +

fwssd is a child process of which of the following Check Point daemons?

fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A

January 24, 2023 No Comments READ MORE +

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...

January 24, 2023 No Comments READ MORE +