What is the mechanism behind Threat Extraction?
What is the mechanism behind Threat Extraction?A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy...
How many options are available to calculate the traffic direction?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?A . 5 Network; Host; Objects; Services; APIB . 3 Incoming; Outgoing; NetworkC . 2 Internal; ExternalD...
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . ReportsB . AdvancedC . CheckupsD . ViewsE . SummaryView AnswerAnswer: A Explanation: Advanced Security Checkups can be easily conducted within the Reports tab in the Logs & Monitor view in SmartConsole. The Reports tab allows you to generate and view various...
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.A . upgrade_importB . cpconfigC . fwm dbimport -p <export file>D . cpinfo CrecoverView AnswerAnswer: A
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.A . TCP port 19009B . TCP Port 18190C . TCP Port 18191D . TCP Port...
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?A . 50%B . 75%C . 80%D . 15%View AnswerAnswer: D Explanation: Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk...
Which of the following process pulls application monitoring status?
Which of the following process pulls application monitoring status?A . fwdB . fwmC . cpwdD . cpdView AnswerAnswer: D Explanation: The process that pulls application monitoring status is cpd. cpd is a daemon that runs on Check Point products and performs various tasks related to management communication, policy installation, license...
Which features are only supported with R81.20 Gateways but not R77.x?
Which features are only supported with R81.20 Gateways but not R77.x?A . Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.B . Limits the upload and download throughput for streaming media in the company to 1 Gbps.C . The rule...
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:A . Allow GUI Client and management server to communicate via TCP Port 19001B . Allow GUI...
The Firewall kernel is replicated multiple times, therefore:
The Firewall kernel is replicated multiple times, therefore:A . The Firewall kernel only touches the packet if the connection is acceleratedB . The Firewall can run different policies per coreC . The Firewall kernel is replicated only with new connections and deletes itself once the connection times outD . The...