Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client InfoB . SecuRemoteC . Check Point ProtectD . Check Point Capsule CloudView AnswerAnswer: C Explanation: Check Point Protect is a lightweight app that can...
What is true about the IPS-Blade?
What is true about the IPS-Blade?A . In R81, IPS is managed by the Threat Prevention PolicyB . In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and StrictC . In R81, IPS Exceptions cannot be attached to “all rules”D . In R81, the GeoPolicy...
Which statement is correct about the Sticky Decision Function?
Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator cardB . Does not support SPI’s when configured for Load SharingC . It is automatically disabled if the Mobile Access Software Blade is enabled on the...
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote UserB . Check Point Capsule WorkspaceC . Check Point Mobile Web PortalD . Check Point Capsule RemoteView AnswerAnswer: C Explanation: Check Point Mobile Web...
How can you enable them?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?A...
What is the correct command to observe the Sync traffic in a VRRP environment?
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;” B. fw monitor Ce “accept port(6118;” C. fw monitor Ce “accept proto=mcVRRP;” D. fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D
What is the difference between an event and a log?
What is the difference between an event and a log?A . Events are generated at gateway according to Event Policy B. A log entry becomes an event when it matches any rule defined in Event Policy C. Events are collected with SmartWorkflow form Trouble Ticket systems D. Log and Events...
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?A . Dynamic ID B. RADIUS C. Username and Password D. CertificateView AnswerAnswer: A
What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender. B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect D. Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D