What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client Service B. Network and Application C. Network and Layers D. Virtual Adapter and Mobile AppView AnswerAnswer:...
Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D
fwssd is a child process of which of the following Check Point daemons?
fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port Overflow B. Local Interface Spoofing C. Suspicious Activity Monitoring D. Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
Where you can see and search records of action done by R81 SmartConsole administrators?
Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open Audit Log View” C. In SmartAuditLog View D. In Smartlog, all logsView AnswerAnswer: B
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A
Which two of these Check Point Protocols are used by SmartEvent Processes?
Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
Which TCP-port does CPM process listen to?
Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....
Which command collects diagnostic data for analyzing customer setup remotely?
Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...