What are the two modes of SNX?

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client Service B. Network and Application C. Network and Layers D. Virtual Adapter and Mobile AppView AnswerAnswer:...

August 21, 2023 No Comments READ MORE +

Which of the SecureXL templates are enabled by default on Security Gateway?

Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D

August 21, 2023 No Comments READ MORE +

fwssd is a child process of which of the following Check Point daemons?

fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A

August 21, 2023 No Comments READ MORE +

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port Overflow B. Local Interface Spoofing C. Suspicious Activity Monitoring D. Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...

August 20, 2023 No Comments READ MORE +

Where you can see and search records of action done by R81 SmartConsole administrators?

Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open Audit Log View” C. In SmartAuditLog View D. In Smartlog, all logsView AnswerAnswer: B

August 20, 2023 No Comments READ MORE +

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A

August 20, 2023 No Comments READ MORE +

Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D

August 20, 2023 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D

August 20, 2023 No Comments READ MORE +

Which component is NOT part of the SandBlast Mobile solution?

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....

August 20, 2023 No Comments READ MORE +

Which command collects diagnostic data for analyzing customer setup remotely?

Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...

August 20, 2023 No Comments READ MORE +