Which two of these Check Point Protocols are used by SmartEvent Processes?
Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
Which TCP-port does CPM process listen to?
Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....
Which command collects diagnostic data for analyzing customer setup remotely?
Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...
Identify the API that is not supported by Check Point currently.
Identify the API that is not supported by Check Point currently.A . R81 Management API- B. Identity Awareness Web Services API C. Open REST API D. OPSEC SDKView AnswerAnswer: C
To simplify security administration, which action would you choose?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2 B. 1 C. 4 D. 6View AnswerAnswer: A
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...
Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C