What API command can he use in the script to achieve the requirement?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?A . add host name <New HostName> ip-address <ip address>B . add hostname <New HostName> ip-address <ip address>C . set host name <New...
Which statement is correct about the Sticky Decision Function?
Which statement is correct about the Sticky Decision Function?A . It is not supported with either the Performance pack of a hardware based accelerator cardB . Does not support SPI’s when configured for Load SharingC . It is automatically disabled if the Mobile Access Software Blade is enabled on the...
Where you can see and search records of action done by R81 SmartConsole administrators?
Where you can see and search records of action done by R81 SmartConsole administrators?A . In SmartView Tracker, open active logB . In the Logs & Monitor view, select “Open Audit Log View”C . In SmartAuditLog ViewD . In Smartlog, all logsView AnswerAnswer: B
What are the three components for Check Point Capsule?
What are the three components for Check Point Capsule?A . Capsule Docs, Capsule Cloud, Capsule ConnectB . Capsule Workspace, Capsule Cloud, Capsule ConnectC . Capsule Workspace, Capsule Docs, Capsule ConnectD . Capsule Workspace, Capsule Docs, Capsule CloudView AnswerAnswer: D
Which command would disable a Cluster Member permanently?
Which command would disable a Cluster Member permanently?A . clusterXL_admin downB . cphaprob_admin downC . clusterXL_admin down-pD . set clusterXL down-pView AnswerAnswer: C
Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?A . Management DashboardB . GatewayC . Personal User StorageD ....
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC)B . Restart Daemons if they failC . Transfers messages between Firewall processesD . Pulls application monitoring statusView AnswerAnswer: D
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...
If you needed the Multicast MAC address of a cluster, what command would you run?
If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca ifB . cphaconf ccp multicastC . cphaconf debug dataD . cphaprob igmpView AnswerAnswer: D