Which is NOT an option to adjust or configure?

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?A . Severity B. Automatic reactions C. Policy D. ThresholdView AnswerAnswer: C

September 13, 2022 No Comments READ MORE +

What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?A . restore_backup B. import backup C. cp_merge D. migrate importView AnswerAnswer: D

September 13, 2022 No Comments READ MORE +

Which of these statements describes the Check Point ThreatCloud?

Which of these statements describes the Check Point ThreatCloud?A . Blocks or limits usage of web applications B. Prevents or controls access to web sites based on category C. Prevents Cloud vulnerability exploits D. A worldwide collaborative security networkView AnswerAnswer: D

September 13, 2022 No Comments READ MORE +

How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode?A . 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for D. the most new imageView AnswerAnswer: A

September 13, 2022 No Comments READ MORE +

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...

September 13, 2022 No Comments READ MORE +

Which of those hosts should you try to remediate first?

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat Emulation B. Host having a Critical event found by IPS C....

September 13, 2022 No Comments READ MORE +

What command verifies that the API server is responding?

What command verifies that the API server is responding?A . api stat B. api status C. show api_status D. app_get_statusView AnswerAnswer: B

September 12, 2022 No Comments READ MORE +

Post-Automatic/Manual NAT rules

Post-Automatic/Manual NAT rulesA . 1, 2, 3, 4 B. 1, 4, 2, 3 C. 3, 1, 2, 4 D. 4, 3, 1, 2View AnswerAnswer: A

September 12, 2022 No Comments READ MORE +

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:A . fw ctl multik set_mode 1 B. fw ctl Dynamic_Priority_Queue on C. fw ctl Dynamic_Priority_Queue enable D. fw ctl multik set_mode 9View AnswerAnswer: D

September 12, 2022 No Comments READ MORE +

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset everyA . 15 sec B. 60 sec C. 5 sec D. 30 secView AnswerAnswer: B

September 12, 2022 No Comments READ MORE +