Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.A . DLP shared policy B. Geo policy shared policy C. Mobile Access software blade D. HTTPS inspectionView AnswerAnswer: B Explanation: Shared Policies The Shared Policies section in the Security Policies shows the...
After installation, is the administrator required to perform any additional tasks?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?A . Go to clash-Run cpstop | Run cpstart B. Go to clash-Run cpconfig...
Which type of attack can a firewall NOT prevent?
Which type of attack can a firewall NOT prevent?A . Network Bandwidth Saturation B. Buffer Overflow C. SYN Flood D. SQL InjectionView AnswerAnswer: A
Which of these statements is FALSE?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?A . Section titles are not sent to the gateway side. B. These sections are simple visual divisions of the Rule Base and do not hinder the order of rule enforcement....
Which of the following are types of VPN communities?
Which of the following are types of VPN communities?A . Pentagon, star, and combination B. Star, octagon, and combination C. Combined and star D. Meshed, star, and combinationView AnswerAnswer: D
To view statistics on detected threats, which Threat Tool would an administrator use?
To view statistics on detected threats, which Threat Tool would an administrator use?A . Protections B. IPS Protections C. Profiles D. ThreatWikiView AnswerAnswer: D
What are the two types of NAT supported by the Security Gateway?
What are the two types of NAT supported by the Security Gateway?A . Destination and Hide B. Hide and Static C. Static and Source D. Source and DestinationView AnswerAnswer: B Explanation: A Security Gateway can use these procedures to translate IP addresses in your network:
How do you review the logs to see what the problem may be?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the...
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?A . Source B. Static C. Hide D. DestinationView AnswerAnswer: B
Can you use the same layer in multiple policies or rulebases?
Can you use the same layer in multiple policies or rulebases?A . Yes - a layer can be shared with multiple policies and rules. B. No - each layer must be unique. C. No - layers cannot be shared or reused, but an identical one can be created. D. Yes...