A) Log
B) Full Log
C) Detailed Log
D) Extended Log
Correct Answer
verified
Multiple Choice
A) Right click Accept in the rule, select "More", and then check "Enable Identity Captive Portal"
B) On the firewall object, Legacy Authentication screen, check "Enable Identity Captive Portal"
C) In the Captive Portal screen of Global Properties, check "Enable Identity Captive Portal"
D) On the Security Management Server object, check the box "Identity Logging"
Correct Answer
verified
Multiple Choice
A) Purchase the SmartView Monitor license for your Security Management Server.
B) Enable Monitoring on your Security Management Server.
C) Purchase the SmartView Monitor license for your Security Gateway.
D) Enable Monitoring on your Security Gateway.
Correct Answer
verified
Multiple Choice
A) Destination
B) Identity
C) Payload
D) Location
Correct Answer
verified
Multiple Choice
A) ISO 37001
B) Sarbanes Oxley (SOX)
C) HIPAA
D) PCI
Correct Answer
verified
Multiple Choice
A) SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
B) SSL VPN adds an extra VPN header to the packet, IPSec VPN does not
C) IPSec VPN does not support two factor authentication, SSL VPN does support this
D) IPSec VPN uses an additional virtual adapter, SSL VPN uses the client network adapter only
Correct Answer
verified
Multiple Choice
A) I have changed this rule
B) Someone else has changed this rule
C) This rule is managed by check point's SOC
D) This rule can't be changed as it's an implied rule
Correct Answer
verified
Multiple Choice
A) If the user credentials do not match an Access Role, the traffic is automatically dropped.
B) If the user credentials do not match an Access Role, the system displays a sandbox.
C) If the user credentials do not match an Access Role, the gateway moves onto the next rule.
D) If the user credentials do not match an Access Role, the system displays the Captive Portal.
Correct Answer
verified
Multiple Choice
A) Verification tool
B) Verification licensing
C) Automatic licensing
D) Automatic licensing and Verification tool
Correct Answer
verified
Multiple Choice
A) A lock icon shows that a rule or an object is locked and will be available.
B) AdminA and AdminB are editing the same rule at the same time.
C) A lock icon next to a rule informs that any Administrator is working on this particular rule.
D) AdminA, AdminB and AdminC are editing three different rules at the same time.
Correct Answer
verified
Multiple Choice
A) UDP
B) TDP
C) CCP
D) HTTP
Correct Answer
verified
Multiple Choice
A) X-chkp-sid
B) Accept-Charset
C) Proxy-Authorization
D) Application
Correct Answer
verified
Multiple Choice
A) Pencil
B) Padlock
C) Book
D) Eyeglasses
Correct Answer
verified
Multiple Choice
A) Threat Emulation
B) Access Control
C) Desktop Security
D) Threat Prevention
Correct Answer
verified
Multiple Choice
A) The Internet.
B) Interfaces that administrator has defined to be part of External Security Zone.
C) External interfaces on all security gateways.
D) External interfaces of specific gateways.
Correct Answer
verified
Multiple Choice
A) in R80, IPS is managed by the Threat Prevention Policy
B) in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C) in R80, IPS Exceptions cannot be attached to "all rules"
D) in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Correct Answer
verified
Multiple Choice
A) All Connections (Clear or Encrypted)
B) Accept all encrypted traffic
C) Specific VPN Communities
D) All Site-to-Site VPN Communities
Correct Answer
verified
Multiple Choice
A) Server, SCP, Username, Password, Path, Comment, Member
B) Server, TFTP, Username, Password, Path, Comment, All Members
C) Server, Protocol, Username, Password, Path, Comment, All Members
D) Server, Protocol, Username, Password, Path, Comment, Member
Correct Answer
verified
Multiple Choice
A) Consolidation Policy
B) Correlation Unit
C) SmartEvent Policy
D) SmartEvent GUI
Correct Answer
verified
Multiple Choice
A) remove database lock
B) The database feature has one command: lock database override. The database feature has one command: lock database override.
C) override database lock
D) The database feature has two commands: lock database override and unlock database . Both will work. The database feature has two commands: lock database override and unlock database . Both will work.
Correct Answer
verified
Showing 61 - 80 of 676
Related Exams