Which two of these Check Point Protocols are used by SmartEvent Processes?

Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D

August 20, 2023 No Comments READ MORE +

Which TCP-port does CPM process listen to?

Which TCP-port does CPM process listen to?A . 18191 B. 18190 C. 8983 D. 19009View AnswerAnswer: D

August 20, 2023 No Comments READ MORE +

Which component is NOT part of the SandBlast Mobile solution?

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management Dashboard B. Gateway C. Personal User Storage D....

August 20, 2023 No Comments READ MORE +

Which command collects diagnostic data for analyzing customer setup remotely?

Which command collects diagnostic data for analyzing customer setup remotely?A . cpinfo B. migrate export C. sysinfo D. cpviewView AnswerAnswer: A Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the...

August 20, 2023 No Comments READ MORE +

Identify the API that is not supported by Check Point currently.

Identify the API that is not supported by Check Point currently.A . R81 Management API- B. Identity Awareness Web Services API C. Open REST API D. OPSEC SDKView AnswerAnswer: C

August 20, 2023 No Comments READ MORE +

To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules. B. Create a separate Security Policy package for each remote Security Gateway. C. Create network...

August 20, 2023 No Comments READ MORE +

What is the least amount of CPU cores required to enable CoreXL?

What is the least amount of CPU cores required to enable CoreXL?A . 2 B. 1 C. 4 D. 6View AnswerAnswer: A

August 20, 2023 No Comments READ MORE +

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected. B. Configure rules to limit the available network bandwidth for specified users or groups. C. Use UserCheck to...

August 20, 2023 No Comments READ MORE +

Which application would you use?

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C

August 20, 2023 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C

August 19, 2023 No Comments READ MORE +