Security Zones do no work with what type of defined rule?

Security Zones do no work with what type of defined rule?A . Application Control rule B. Manual NAT rule C. IPS bypass rule D. Firewall ruleView AnswerAnswer: B Explanation: https://community.checkpoint.com/t5/Management/Workaround-for-manual-NAT-when-security-zones-are-used/td-p/9915

May 5, 2023 No Comments READ MORE +

What are those forms?

Check Point licenses come in two forms. What are those forms?A . Central and Local. B. Access Control and Threat Prevention. C. On-premise and Public Cloud. D. Security Gateway and Security Management.View AnswerAnswer: A

May 4, 2023 No Comments READ MORE +

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:A . Rename the hostname of the...

May 4, 2023 No Comments READ MORE +

Session unique identifiers are passed to the web api using which http header option?

Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C

May 4, 2023 No Comments READ MORE +

Which statement best describes this Secure Internal Communication (SIC)?

The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal Communication (SIC)? A. After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed...

May 3, 2023 No Comments READ MORE +

SmartEvent does NOT use which of the following procedures to identity events:

SmartEvent does NOT use which of the following procedures to identity events:A . Matching a log against each event definition B. Create an event candidate C. Matching a log against local exclusions D. Matching a log against global exclusionsView AnswerAnswer: C

May 3, 2023 No Comments READ MORE +

When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:

When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:A . Security Management Server’s /home/.fgpt file and is available for future SmartConsole authentications. B. Windows registry is available for future Security Management Server authentications. C. There is no memory used...

May 3, 2023 No Comments READ MORE +

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?A . Anti-Bot B. None - both Anti-Virus and Anti-Bot are required for this C. Anti-Virus D. None - both URL Filtering and Anti-Virus are required...

May 3, 2023 No Comments READ MORE +

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?A . Manage and Command Line B. Logs and Monitor C. Security Policies D. Gateway and ServersView AnswerAnswer: A Explanation:

May 2, 2023 No Comments READ MORE +

What is the BEST method to deploy Identity Awareness for roaming users?

What is the BEST method to deploy Identity Awareness for roaming users?A . Use Office Mode B. Use identity agents C. Share user identities between gateways D. Use captive portalView AnswerAnswer: B Explanation: Using Endpoint Identity Agents give you:

May 2, 2023 No Comments READ MORE +