Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?A . Application Control B. Threat Emulation C. Logging and Status D. MonitoringView AnswerAnswer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Monitoring-Blade.htm
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?A . Involved traffic logs will be forwarded to a log server. B. Provides log details view email to the Administrator. C. Involved traffic logs are updated every 10 minutes to show how much data has...
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.A . Formal; corporate B. Local; formal C. Local; central D. Central; localView AnswerAnswer: D
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?A . Object Browser B. Object Editor C. Object Navigator D. Object ExplorerView AnswerAnswer: D
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.A . True, every administrator works on a different database that Is independent of the other administrators B. False, this feature has to be enabled in the Global...
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:A . Rename the hostname of the...
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.A . Concurrent policy packages B. Concurrent policies C. Global Policies D. Shared policiesView AnswerAnswer: D Explanation: "The Shared Policies section in the Security Policies shows the policies that are not in a Policy...
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.A . SecurID B. LDAP C. NT domain D. SMTPView AnswerAnswer: B Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/LDAP-and-User-Directory.htm
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?A . All options stop Check Point processes B. backup C. migrate export D. snapshotView AnswerAnswer: D
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.A . SmartView Web Application B. SmartTracker C. SmartMonitor D. SmartReporterView AnswerAnswer: A Explanation: "The SmartEvent Software Blade is a unified security event management and analysis solution...