Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _____.
Answer: Threat Prevention policy install Threat Prevention policy install Explanation: https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=documents/R80/CP_R80BC_ThreatPrevention/136486
Fill in the blank: RADIUS Accounting gets _____ data from requests generated by the accounting client
Answer: Identity Identity Explanation: How RADIUS Accounting Woks with Identity Awareness RADIUS Accounting gets identify data from RADIUS Accounting Requests generated by the RADIUS accounting client. Reference: Identity Awareness Web Admin Guide
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _____ consolidates billions of logs and shows them as prioritized security events.
Answer: SmartView Web Application Explanation: Event Analysis with SmartEvent The SmartEvent Software Blade is a unified security event management and analysis solution that delivers real-time, graphical threat management information. SmartConsole, SmartView, Web Application, and the SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can immediately respond to security incidents, and do the necessary actions to prevent more attacks. You can customize the views to monitor the events that are most important to you. You can move from a high level view to detailed forensic analysis in a few clicks. With the free-text search and suggestions, you can quickly run data analysis and identify critical security events. Reference: Logging and Monitoring
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
How many users can have read/write access in Gaia at one time?
Choose what BEST describes the reason why querying logs now is very fast.
A user makes changes to the Security Management Server. If the user does not install the Database, when will the changes be lost?
Which software combines logs, identifies security threats, and presents probable attack patterns from all network devices in one place?
Between his corporate office and a branch office, an administrator is establishing an IPsec site-to-site VPN. The same Security Management Server-managed Check Point Security Gateway provides security for both workplaces. The administrator discovered that the check box to enable pre-shared secret is shared and cannot be activated while configuring the VPN community to specify the pre-shared secret. Why is it not possible for him to mention the previously disclosed secret?
Which of the subsequent ClusterXL configurations uses a non-unicast MAC address as the cluster IP address.
Which of the following DOES NOT constitute a distinguished name component?
Which three authentication techniques does SIC use?
You have selected the tracking option for a security rule called “Extended Log.” You still don’t see any data type information, though. What is the MOST probable cause?
What is the NAT priority hierarchy?
Which of the following identity acquisition techniques enables a Security Gateway to recognise machines and Active Directory users?
Ken wants to ask another administrator for a configuration lock for the R80 Security Management Server Operating System. He has two options for doing this: WebUI or CLI. What CLI command should he enter?
Which blade will Harriet activate to accomplish her goal of preventing sensitive information from being intentionally lost when users navigate to a specified URL: https://personal.mymail.com?
What form of licence activation is NOT one of the following?
How is communication between different Check Point components secured in R81? As with all questions, select the best answer.
Which icon indicates that read/write access is enabled?
Using R81 Smart Console, what does a “pencil icon” in a rule mean?
What is true about the IPS-Blade?
Share your Results: