SmartLog can be used to identify which of the following: A. Security Policy version control information B. A list of currently connected users C. The country of origin of specific traffic displayed on a map D. The top destination IP…

SmartLog displays: A. Information about known threats and provides steps for remediation B. Events in chart format, with detailed data about threats C. Real time data, to help identify ongoing threats D. Historic data that can be used for research…

A customer does not own Check Point Gateways, but he wants to use Threat Emulation Service to detect SMTP Zero-Day vulnerabilities. What is his option? A. Use MTA plug-in on his exchange server. B. Needs to buy a Check Point…

Which blades can support HTTPS inspection? A. Threat Prevention, Application Control, and IPS B. IPS, Advanced Networking, and Threat Prevention C. IPS, Application Control, DLP, Threat Prevention D. Application Control, Advanced Networking, Threat Prevention, IPS