What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection traffic B. Automatically uploads debugging logs to Check Point Support Center C. It will not block malicious traffic D. Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?A . fw ctl sdstat B. fw ctl affinity Cl Ca Cr Cv C. fw ctl multik stat D. cpinfoView AnswerAnswer: B
Connections to the Check Point R81 Web API use what protocol?
Connections to the Check Point R81 Web API use what protocol?A . HTTPS B. RPC C. VPN D. SICView AnswerAnswer: A
Which of these statements describes the Check Point ThreatCloud?
Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applications B. Prevents or controls access to web sites based on category C. Prevents Cloud vulnerability exploits D. A worldwide collaborative security networkView AnswerAnswer: D
What are the two modes of SNX?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?A . Application and Client Service B. Network and Application C. Network and Layers D. Virtual Adapter and Mobile AppView AnswerAnswer:...
Which of the SecureXL templates are enabled by default on Security Gateway?
Which of the SecureXL templates are enabled by default on Security Gateway?A . Accept B. Drop C. NAT D. NoneView AnswerAnswer: D
fwssd is a child process of which of the following Check Point daemons?
fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.A . Block Port Overflow B. Local Interface Spoofing C. Suspicious Activity Monitoring D. Adaptive Threat PreventionView AnswerAnswer: C Explanation: Suspicious Activity Rules Solution Suspicious Activity Rules is a utility integrated into SmartView...
Where you can see and search records of action done by R81 SmartConsole administrators?
Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open Audit Log View” C. In SmartAuditLog View D. In Smartlog, all logsView AnswerAnswer: B
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpm B. fwm via fwd C. cpm via cpd D. fwd via cpdView AnswerAnswer: A