Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client InfoB . SecuRemoteC . Check Point ProtectD . Check Point Capsule CloudView AnswerAnswer: C
In R81, how do you manage your Mobile Access Policy?
In R81, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A
Which command is used to set the CCP protocol to Multicast?
Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B
Which is NOT an option to adjust or configure?
Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?A . SeverityB . Automatic reactionsC . PolicyD . ThresholdView AnswerAnswer: C
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote UserB . Check Point Capsule WorkspaceC . Check Point Mobile Web PortalD . Check Point Capsule RemoteView AnswerAnswer: C
What is the difference between an event and a log?
What is the difference between an event and a log?A . Events are generated at gateway according to Event PolicyB . A log entry becomes an event when it matches any rule defined in Event PolicyC . Events are collected with SmartWorkflow form Trouble Ticket systemsD . Log and Events...
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . Security GatewayE . SmartEventView AnswerAnswer: D
What is the correct command to observe the Sync traffic in a VRRP environment?
What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”B . fw monitor Ce “accept port(6118;”C . fw monitor Ce “accept proto=mcVRRP;”D . fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D
How many options are available to calculate the traffic direction?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD...
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______.
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______.A . TCP 18211B . TCP 257C . TCP 4433D . TCP 443View AnswerAnswer: D