What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:A . Allow GUI Client and management server to communicate via TCP Port 19001B . Allow GUI...
CPM process stores objects, policies, users, administrators, licenses and management data in a database.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQLB . Postgres SQLC . MarisDBD . SOLRView AnswerAnswer: B
What command will you use to provide such information to manager?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?A . fw accel statB . fwaccel statC . fw acces statsD . fwaccel statsView AnswerAnswer: B
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
Which statement is true regarding redundancy?
Which statement is true regarding redundancy?A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a ClusterXL High Availability...
Which of those hosts should you try to remediate first?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?A . Host having a Critical event found by Threat EmulationB . Host having a Critical event found by IPSC ....
Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPDB . FWD and LEAC . FWD and CPLOGD . ELA and CPLOGView AnswerAnswer: D
What is the least amount of CPU cores required to enable CoreXL?
What is the least amount of CPU cores required to enable CoreXL?A . 2B . 1C . 4D . 6View AnswerAnswer: B
Identify the API that is not supported by Check Point currently.
Identify the API that is not supported by Check Point currently.A . R81 Management API-B . Identity Awareness Web Services APIC . Open REST APID . OPSEC SDKView AnswerAnswer: C