Which application would you use?

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client InfoB . SecuRemoteC . Check Point ProtectD . Check Point Capsule CloudView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

In R81, how do you manage your Mobile Access Policy?

In R81, how do you manage your Mobile Access Policy?A . Through the Unified PolicyB . Through the Mobile ConsoleC . From SmartDashboardD . From the Dedicated Mobility TabView AnswerAnswer: A

July 21, 2022 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B

July 21, 2022 No Comments READ MORE +

Which is NOT an option to adjust or configure?

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?A . SeverityB . Automatic reactionsC . PolicyD . ThresholdView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote UserB . Check Point Capsule WorkspaceC . Check Point Mobile Web PortalD . Check Point Capsule RemoteView AnswerAnswer: C

July 21, 2022 No Comments READ MORE +

What is the difference between an event and a log?

What is the difference between an event and a log?A . Events are generated at gateway according to Event PolicyB . A log entry becomes an event when it matches any rule defined in Event PolicyC . Events are collected with SmartWorkflow form Trouble Ticket systemsD . Log and Events...

July 21, 2022 No Comments READ MORE +

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?A . None, Security Management Server would be installed by itself.B . SmartConsoleC . SecureClientD . Security GatewayE . SmartEventView AnswerAnswer: D

July 20, 2022 No Comments READ MORE +

What is the correct command to observe the Sync traffic in a VRRP environment?

What is the correct command to observe the Sync traffic in a VRRP environment?A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”B . fw monitor Ce “accept port(6118;”C . fw monitor Ce “accept proto=mcVRRP;”D . fw monitor Ce “accept dst=224.0.0.18;”View AnswerAnswer: D

July 20, 2022 No Comments READ MORE +

How many options are available to calculate the traffic direction?

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD...

July 20, 2022 No Comments READ MORE +

The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______.

The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______.A . TCP 18211B . TCP 257C . TCP 4433D . TCP 443View AnswerAnswer: D

July 20, 2022 No Comments READ MORE +