How could you tune the profile in order to lower the CPU load still maintaining security at good level?
Provide very wide coverage for all products and protocols, with noticeable performance impact. How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.A . Set High Confidence to Low and Low Confidence to Inactive.B . Set the...
In R80 spoofing is defined as a method of:
In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license storedA . Security GatewayB . Check Point user centerC . Security Management ServerD . SmartConsole installed deviceView AnswerAnswer: C Explanation: SmartUpdate installs two repositories on the Security Management server: License & Contract Repository...
At what point is the Internal Certificate Authority (ICA) created?
At what point is the Internal Certificate Authority (ICA) created?A . Upon creation of a certificateB . During the primary Security Management Server installation process.C . When an administrator decides to create one.D . When an administrator initially logs into SmartConsole.View AnswerAnswer: B Explanation: Introduction to the ICA The ICA...
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?A . CentralB . CorporateC . FormalD . LocalView AnswerAnswer: D
Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.
Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point...
What is the default time length that Hit Count Data is kept?
What is the default time length that Hit Count Data is kept?A . 3 monthB . 4 weeksC . 12 monthsD . 6 monthsView AnswerAnswer: A Explanation: Keep Hit Count data up to - Select one of the time range options. The default is 6 months. Data is kept in...
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?A . DLPB . SSL InspectionC . Application ControlD . URL FilteringView AnswerAnswer: A Explanation: Check Point revolutionizes DLP by combining technology and processes to...
What port is used for delivering logs from the gateway to the management server?
What port is used for delivering logs from the gateway to the management server?A . Port 258B . Port 18209C . Port 257D . Port 981View AnswerAnswer: C