In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?A . SND is a feature to accelerate multiple SSL VPN connections B. SND is an alternative to IPSec Main Mode, using only 3 packets C. SND is used to distribute packets among Firewall instances D....

November 7, 2022 No Comments READ MORE +

Which GUI tool can be used to view and apply Check Point licenses?

Which GUI tool can be used to view and apply Check Point licenses?A . cpconfig B. Management Command Line C. SmartConsole D. SmartUpdateView AnswerAnswer: D Explanation: SmartUpdate GUI is the recommended way of managing licenses.

November 7, 2022 No Comments READ MORE +

Which of the following is NOT a valid deployment option for R80?

Which of the following is NOT a valid deployment option for R80?A . All-in-one (stand-alone) B. CloudGuard C. Distributed D. Bridge ModeView AnswerAnswer: B

November 7, 2022 No Comments READ MORE +

URL Filtering cannot be used to:

URL Filtering cannot be used to:A . Control Bandwidth issues B. Control Data Security C. Improve organizational security D. Decrease legal liabilityView AnswerAnswer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm

November 7, 2022 No Comments READ MORE +

What tool can you use to block this traffic?

A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?A . Anti-Bot protection B. Anti-Malware protection...

November 6, 2022 No Comments READ MORE +

Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.

Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.A . SHA-256 B. SHA-200 C. MD5 D. SHA-128View AnswerAnswer: A

November 6, 2022 No Comments READ MORE +

When configuring Anti-Spoofing, which tracking options can an Administrator select?

When configuring Anti-Spoofing, which tracking options can an Administrator select?A . Log, Alert, None B. Log, Allow Packets, Email C. Drop Packet, Alert, None D. Log, Send SNMP Trap, EmailView AnswerAnswer: A Explanation: Configure Spoof Tracking - select the tracking action that is done when spoofed packets are detected: Log...

November 6, 2022 No Comments READ MORE +

What is the purpose of the Clean-up Rule?

What is the purpose of the Clean-up Rule?A . To log all traffic that is not explicitly allowed or denied in the Rule Base B. To clean up policies found inconsistent with the compliance blade reports C. To remove all rules that could have a conflict with other rules in...

November 5, 2022 No Comments READ MORE +

Log query results can be exported to what file format?

Log query results can be exported to what file format?A . Word Document (docx) B. Comma Separated Value (csv) C. Portable Document Format (pdf) D. Text (txt)View AnswerAnswer: B

November 5, 2022 No Comments READ MORE +

Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?

Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?A . Enterprise Network Security Appliances B. Rugged Appliances C. Scalable Platforms D. Small Business and Branch Office AppliancesView AnswerAnswer: A

November 5, 2022 No Comments READ MORE +