Which tool would an administrator use?
To view the policy installation history for each gateway, which tool would an administrator use? A. Revisions B. Gateway installations C. Installation history D. Gateway history
To view the policy installation history for each gateway, which tool would an administrator use? A. Revisions B. Gateway installations C. Installation history D. Gateway history
Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices? A. Gateway and Servers B. Logs and Monitor C. Manage and Settings D. Security Policies
Which of the following is NOT a valid deployment option for R80? A. All-in-one (stand-alone) B. Log server C. SmartEvent D. Multi-domain management server
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component? A. None, Security Management Server would be installed by itself. B. SmartConsole C. SecureClient D. SmartEvent
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication. A. Shared secret B. Token C. Username/password or Kerberos Ticket D. Certificate
What is the purpose of a Stealth Rule? A. A rule used to hide a server’s IP address from the outside world. B. A rule that allows administrators to access SmartDashboard from any device. C. To drop any traffic destined…
Which of the following is used to enforce changes made to a Rule Base? A. Publish database B. Save changes C. Install policy D. Activate policy
What is UserCheck? A. Messaging tool used to verify a user’s credentials B. Communication tool used to inform a user about a website or application they are trying to access C. Administrator tool used to monitor users on their network…
The "Hit count" feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to "None"? A. No, it will…
How many layers make up the TCP/IP model? A. 2 B. 7 C. 6 D. 4