What is true about the IPS-Blade?

What is true about the IPS-Blade?A . In R80, IPS is managed by the Threat Prevention PolicyB . In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R80, IPS Exceptions cannot be attached to “all rules”D . In R80, the GeoPolicy...

September 10, 2021 No Comments READ MORE +

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?A . All Connections (Clear or Encrypted)B . Accept all encrypted trafficC . Specific VPN CommunitiesD . All Site-to-Site VPN CommunitiesView AnswerAnswer: B

September 10, 2021 No Comments READ MORE +

What command should you use?

You want to store the GAIA configuration in a file for later reference . What command should you use?A . write mem <filename>B . show config Cf <filename>C . save config Co <filename>D . save configuration <filename>View AnswerAnswer: D

September 10, 2021 No Comments READ MORE +

What should he do first?

Aaron is a Syber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R80.X The Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server Aaron wants to confirm API services are...

September 9, 2021 No Comments READ MORE +

Which SmartConsole tab is used to monitor network and security performance?

Which SmartConsole tab is used to monitor network and security performance?A . Manage SettingB . Security PoliciesC . Gateway and ServersD . Logs and MonitorView AnswerAnswer: D

September 9, 2021 No Comments READ MORE +

What is the default size of NAT table fwx_alloc?

What is the default size of NAT table fwx_alloc?A . 20000B . 35000C . 25000D . 10000View AnswerAnswer: C

September 9, 2021 No Comments READ MORE +

The Firewall kernel is replicated multiple times, therefore:

The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is acceleratedB . The Firewall can run different policies per coreC . The Firewall kernel is replicated only with new connections and deletes itself once the connection times outD . The...

September 9, 2021 No Comments READ MORE +

What is this setting called and what are you defining?

When configuring SmartEvent Initial settings, you must specify a basic topology for SmartEvent to help it calculate traffic direction for events . What is this setting called and what are you defining?A . Network, and defining your Class A spaceB . Topology, and you are defining the Internal networkC ....

September 9, 2021 No Comments READ MORE +

What is not a component of Check Point SandBlast?

What is not a component of Check Point SandBlast?A . Threat EmulationB . Threat SimulatorC . Threat ExtractionD . Threat CloudView AnswerAnswer: B

September 9, 2021 No Comments READ MORE +

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?A . FirewallB . VPNC . IPSD . HTTPSView AnswerAnswer: C

September 9, 2021 No Comments READ MORE +