How do you manage Gaia?

How do you manage Gaia?A . Through CLI and WebUIB . Through CLI onlyC . Through SmartDashboard onlyD . Through CLI, WebUI, and SmartDashboardView AnswerAnswer: A

January 11, 2024 No Comments READ MORE +

In which scenario is it a valid option to transfer a license from one hardware device to another?

In which scenario is it a valid option to transfer a license from one hardware device to another?A . From a 4400 Appliance to a 2200 ApplianceB . From a 4400 Appliance to an HP Open ServerC . From an IBM Open Server to an HP Open ServerD . From...

January 11, 2024 No Comments READ MORE +

Name one limitation of using Security Zones in the network?

Name one limitation of using Security Zones in the network?A . Security zones will not work in Automatic NAT rulesB . Security zone will not work in Manual NAT rulesC . Security zones will not work in firewall policy layerD . Security zones cannot be used in network topologyView AnswerAnswer:...

January 11, 2024 No Comments READ MORE +

Which GUI tool can be used to view and apply Check Point licenses?

Which GUI tool can be used to view and apply Check Point licenses?A . cpconfigB . Management Command LineC . SmartConsoleD . SmartUpdateView AnswerAnswer: D Explanation: SmartUpdate GUI is the recommended way of managing licenses.

January 11, 2024 No Comments READ MORE +

What tool can you use to block this traffic?

A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?A . Anti-Bot protectionB . Anti-Malware protectionC...

January 11, 2024 No Comments READ MORE +

What Check Point technologies deny or permit network traffic?

What Check Point technologies deny or permit network traffic?A . Application Control, DLPB . Packet Filtering, Stateful Inspection, Application Layer Firewall.C . ACL, SandBlast, MPTD . IPS, Mobile Threat ProtectionView AnswerAnswer: B

January 10, 2024 No Comments READ MORE +

Which path below is available only when CoreXL is enabled?

Which path below is available only when CoreXL is enabled?A . Slow pathB . Firewall pathC . Medium pathD . Accelerated pathView AnswerAnswer: C

January 10, 2024 No Comments READ MORE +

Fill in the blank Backup and restores can be accomplished through

Fill in the blank Backup and restores can be accomplished throughA . SmartUpdate, SmartBackup. or SmartConsoleB . WebUI. CLI. or SmartUpdateC . CLI. SmartUpdate, or SmartBackupD . SmartConsole, WebUI. or CLIView AnswerAnswer: D

January 10, 2024 No Comments READ MORE +

What is NOT an advantage of Packet Filtering?

What is NOT an advantage of Packet Filtering?A . Application IndependenceB . High PerformanceC . ScalabilityD . Low Security and No Screening above Network LayerView AnswerAnswer: D

January 10, 2024 No Comments READ MORE +

Which of the following is NOT a component of Check Point Capsule?

Which of the following is NOT a component of Check Point Capsule?A . Capsule DocsB . Capsule CloudC . Capsule EnterpriseD . Capsule WorkspaceView AnswerAnswer: C

January 10, 2024 No Comments READ MORE +