Which of the following options can you add to each Log, Detailed Log and Extended Log?

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?A . AccountingB . SuppressionC . Accounting/SuppressionD . Accounting/ExtendedView AnswerAnswer: C Explanation: In Logging and Monitoring, the tracking options are Log,...

March 30, 2024 No Comments READ MORE +

Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?

Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over...

March 30, 2024 No Comments READ MORE +

Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?

Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?A . SmartManagerB . SmartConsoleC . Security GatewayD . Security Management ServerView AnswerAnswer: D Explanation: The Security Management Server is the component that changes most often and should be backed...

March 30, 2024 No Comments READ MORE +

True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.

True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.A . False, this feature has to be enabled in the Global Properties.B . True, every administrator works in a session that is independent of the other administrators.C...

March 29, 2024 No Comments READ MORE +

Which one of the following is TRUE?

Which one of the following is TRUE?A . Ordered policy is a sub-policy within another policyB . One policy can be either inline or ordered, but not bothC . Inline layer can be defined as a rule actionD . Pre-R80 Gateways do not support ordered layersView AnswerAnswer: C Explanation: The...

March 29, 2024 No Comments READ MORE +

What Identity Agent allows packet tagging and computer authentication?

What Identity Agent allows packet tagging and computer authentication?A . Endpoint Security ClientB . Full AgentC . Light AgentD . System AgentView AnswerAnswer: B Explanation: The Full Identity Agent allows packet tagging and computer authentication2. Packet tagging is a feature that enables the Security Gateway to identify the source user...

March 29, 2024 No Comments READ MORE +

Which GUI tool can be used to view and apply Check Point licenses?

Which GUI tool can be used to view and apply Check Point licenses?A . cpconfigB . Management Command LineC . SmartConsoleD . SmartUpdateView AnswerAnswer: D Explanation: The GUI tool that can be used to view and apply Check Point licenses is SmartUpdate. SmartUpdate is a centralized tool that allows you...

March 29, 2024 No Comments READ MORE +

Can multiple administrators connect to a Security Management Server at the same time?

Can multiple administrators connect to a Security Management Server at the same time?A . No, only one can be connectedB . Yes, all administrators can modify a network object at the same timeC . Yes, every administrator has their own username, and works in a session that is independent of...

March 29, 2024 No Comments READ MORE +

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:A . 3rd Party integration of CLI and API for Gateways prior to R80.B . A complete CLI and API interface using SSH and custom CPCode integration.C . 3rd Party integration of CLI and API for...

March 29, 2024 No Comments READ MORE +

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?A . Detects and blocks malware by correlating multiple detection engines before users are affected.B . Configure rules to limit the available network bandwidth for specified users or groups.C . Use UserCheck to...

March 29, 2024 No Comments READ MORE +