To optimize Rule Base efficiency, the most hit rules should be where?
To optimize Rule Base efficiency, the most hit rules should be where?A . Removed from the Rule Base.B . Towards the middle of the Rule Base.C . Towards the top of the Rule Base.D . Towards the bottom of the Rule Base.View AnswerAnswer: C Explanation: It is logical that if...
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.B . Create a separate Security Policy package for each remote Security Gateway.C . Create network...
How many rules on Check Point Firewall are required for this connection?
Joey is using the computer with IP address 192.168.20.13. He wants to access web page “www.Check Point.com”, which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?A . Two rules C first one for the HTTP traffic and...
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:A . assign privileges to users.B . edit the home directory of the user.C . add users to your Gaia system.D . assign user rights to their home directory in the Security Management...
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?A . Display policies and logs on the administrator's workstation.B . Verify and compile Security Policies.C . Processing and sending alerts such as SNMP traps and email notifications.D ....
Which of the following is TRUE about the Check Point Host object?
Which of the following is TRUE about the Check Point Host object?A . Check Point Host has no routing ability even if it has more than one interface installed.B . When you upgrade to R80 from R77.30 or earlier versions, Check Point Host objects are converted to gateway objects.C ....
What is the default shell of Gaia CLI?
What is the default shell of Gaia CLI?A . MonitorB . CLC . shD . Read-onlyE . BashView AnswerAnswer: B Explanation: This chapter gives an introduction to the Gaia command line interface (CLI). The default shell of the CLI is called clish.
In R80, Unified Policy is a combination of
In R80, Unified Policy is a combination ofA . Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.B . Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.C . Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat...
DLP and Geo Policy are examples of what type of Policy?
DLP and Geo Policy are examples of what type of Policy?A . Standard PoliciesB . Shared PoliciesC . Inspection PoliciesD . Unified PoliciesView AnswerAnswer: B Explanation: The Shared policies are installed with the Access Control Policy.
Two administrators Dave and Jon both manage R80 Management as administrators for ABC Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule no.6 in his SmartConsole view even though Jon has it his in his SmartConsole view?
Two administrators Dave and Jon both manage R80 Management as administrators for ABC Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule...