How could you tune the profile in order to lower the CPU load still maintaining security at good level?

Provide very wide coverage for all products and protocols, with noticeable performance impact. How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.A . Set High Confidence to Low and Low Confidence to Inactive.B . Set the...

October 31, 2018 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...

October 31, 2018 No Comments READ MORE +

When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored

When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license storedA . Security GatewayB . Check Point user centerC . Security Management ServerD . SmartConsole installed deviceView AnswerAnswer: C Explanation: SmartUpdate installs two repositories on the Security Management server: License & Contract Repository...

October 28, 2018 No Comments READ MORE +

At what point is the Internal Certificate Authority (ICA) created?

At what point is the Internal Certificate Authority (ICA) created?A . Upon creation of a certificateB . During the primary Security Management Server installation process.C . When an administrator decides to create one.D . When an administrator initially logs into SmartConsole.View AnswerAnswer: B Explanation: Introduction to the ICA The ICA...

October 25, 2018 No Comments READ MORE +

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?A . CentralB . CorporateC . FormalD . LocalView AnswerAnswer: D

October 24, 2018 No Comments READ MORE +

Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.

Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point...

October 21, 2018 No Comments READ MORE +

What is the default time length that Hit Count Data is kept?

What is the default time length that Hit Count Data is kept?A . 3 monthB . 4 weeksC . 12 monthsD . 6 monthsView AnswerAnswer: A Explanation: Keep Hit Count data up to - Select one of the time range options. The default is 6 months. Data is kept in...

October 17, 2018 No Comments READ MORE +

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...

October 16, 2018 No Comments READ MORE +

Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?

Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?A . DLPB . SSL InspectionC . Application ControlD . URL FilteringView AnswerAnswer: A Explanation: Check Point revolutionizes DLP by combining technology and processes to...

October 14, 2018 No Comments READ MORE +

What port is used for delivering logs from the gateway to the management server?

What port is used for delivering logs from the gateway to the management server?A . Port 258B . Port 18209C . Port 257D . Port 981View AnswerAnswer: C

October 14, 2018 No Comments READ MORE +