Which Check Point product implements a Consolidation Policy?
Which Check Point product implements a Consolidation Policy? A. SmartLSM B. SmartView Tracker C. SmartView Monitor D. SmartReporter
Which Check Point product implements a Consolidation Policy? A. SmartLSM B. SmartView Tracker C. SmartView Monitor D. SmartReporter
How many pre-defined exclusions are included by default in SmartEvent R77 as part of the product installation? A. 5 B. 0 C. 10 D. 3
What is the purpose of the pre-defined exclusions included with SmartEvent R77? A. To allow SmartEvent R77 to function properly with all other R71 devices. B. To avoid incorrect event generation by the default IPS event definition; a scenario that…
What is the benefit to running SmartEvent in Learning Mode? A. There is no SmartEvent Learning Mode B. To generate a report with system Event Policy modification suggestions C. To run SmartEvent, with a step-by-step online configuration guide for training/setup…
______________ is NOT an SmartEvent event-triggered Automatic Reaction. A. SNMP Trap B. Block Access C. Mail D. External Script
A tracked SmartEvent Candidate in a Candidate Pool becomes an Event. What does NOT happen in the Analyzer Server? A. SmartEvent provides the beginning and end time of the Event. B. The Event is kept open, but condenses many instances…
You are reviewing computer information collected in ClientInfo. You can NOT: A. Run Google.com search using the contents of the selected cell. B. Enter new credential for accessing the computer information. C. Save the information in the active tab to…
Which of the following is NOT a SmartEvent Permission Profile type? A. No Access B. Events Database C. View D. Read/Write
What is the SmartEvent Correlation Unit’s function? A. Analyze log entries, looking for Event Policy patterns. B. Display received threats and tune the Events Policy. C. Assign severity levels to events. D. Invoke and define automatic reactions and add events…
What is the SmartEvent Analyzer’s function? A. Generate a threat analysis report from the Analyzer database. B. Display received threats and tune the Events Policy. C. Assign severity levels to events. D. Analyze log entries, looking for Event Policy patterns.