Which one is NOT correct?
There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?A . Using Web Services B. Using Mgmt_cli tool C. Using CLISH D. Using SmartConsole GUI console E. Events are collected with SmartWorkflow from Trouble Ticket systemsView AnswerAnswer: E
Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applications B. Prevents or controls access to web sites based on category C. Prevents Cloud vulnerability exploits D. A worldwide collaborative security networkView AnswerAnswer: D
What has to be taken into consideration when configuring Management HA?
What has to be taken into consideration when configuring Management HA?A . The Database revisions will not be synchronized between the management servers B. SmartConsole must be closed prior to synchronized changes in the objects database C. If you wanted to use Full Connectivity Upgrade, you must change the Implied...
Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
In R81 spoofing is defined as a method of:
In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...
Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C
fwssd is a child process of which of the following Check Point daemons?
fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...