Which SmartConsole tab is used to monitor network and security performance?
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
Name the utility that is used to block activities that appear to be suspicious.
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
Which of the following is used to initially create trust between a Gateway and Security Management Server?
Which method below is NOT one of the ways to communicate using the Management API’s?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
Which two Identity Awareness commands are used to support identity sharing?
What are the three main components of Check Point security management architecture?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
Which of the following is considered to be the more secure and preferred VPN authentication method?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
Which of the following situations would not require a new license to be generated and installed?
Which two Identity Awareness daemons are used to support identity sharing?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
Which is a main component of the Check Point security management architecture?
Using ClusterXL, what statement is true about the Sticky Decision Function?