In SmartConsole, on which tab are Permissions and Administrators defined?

In SmartConsole, on which tab are Permissions and Administrators defined?A . Manage and Settings B. Logs and Monitor C. Security Policies D. Gateways and ServersView AnswerAnswer: A

April 23, 2023 No Comments READ MORE +

Which of the following is NOT a component of Check Point Capsule?

Which of the following is NOT a component of Check Point Capsule?A . Capsule Docs B. Capsule Cloud C. Capsule Enterprise D. Capsule WorkspaceView AnswerAnswer: C

April 23, 2023 No Comments READ MORE +

What are the three deployment considerations for a secure network?

What are the three deployment considerations for a secure network?A . Distributed, Bridge Mode, and Remote B. Bridge Mode, Remote, and Standalone C. Remote, Standalone, and Distributed D. Standalone, Distributed, and Bridge ModeView AnswerAnswer: A

April 22, 2023 No Comments READ MORE +

Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?

Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?A . Microsoft Publisher B. JSON C. Microsoft Word D. RC4 EncryptionView AnswerAnswer: B

April 22, 2023 No Comments READ MORE +

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?A . Full B. Custom C. Complete D. LightView AnswerAnswer: A

April 21, 2023 No Comments READ MORE +

Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?A . AD Query B. Browser-Based Authentication C. Identity Agents...

April 21, 2023 No Comments READ MORE +

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?A . Verification tool B. Verification licensing C. Automatic licensing D. Automatic licensing and Verification toolView AnswerAnswer: D

April 21, 2023 No Comments READ MORE +

When should you generate new licenses?

When should you generate new licenses?A . Before installing contract files. B. After an RMA procedure when the MAC address or serial number of the appliance changes. C. When the existing license expires, license is upgraded or the IP-address where the license is tied changes. D. Only when the license...

April 21, 2023 No Comments READ MORE +

The ______ software blade package uses CPU-level and OS-level sandboxing in order to

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.A . Next Generation Threat Prevention B. Next Generation Threat Emulation C. Next Generation Threat Extraction D. Next Generation FirewallView AnswerAnswer: B

April 21, 2023 No Comments READ MORE +

How could you tune the profile in order to lower the CPU load still maintaining security at good level?

CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings. The following Threat Prevention Profile has been created. How could you tune the profile in order to lower the CPU load still maintaining security at good...

April 21, 2023 No Comments READ MORE +