Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is NOT a component of Check Point Capsule?

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

When should you generate new licenses?

A.

Before installing contract files.

B.

After a device upgrade.

C.

When the existing license expires, license is upgraded or the IP-address associated with the license changes.

D.

Only when the license is upgraded.

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?

A.

Manage and Command Line

B.

Logs and Monitor

C.

Security Policies

D.

Gateway and Servers

With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?

A.

The complete communication is sent for inspection.

B.

The IP address of the source machine.

C.

The end user credentials.

D.

The host portion of the URL.

What command from the CLI would be used to view current licensing?

A.

license view

B.

fw ctl tab -t license -s

C.

show license -s

D.

cplic print

Which message indicates IKE Phase 2 has completed successfully?

A.

Quick Mode Complete

B.

Aggressive Mode Complete

C.

Main Mode Complete

D.

IKE Mode Complete

Which of the following is considered to be the more secure and preferred VPN authentication method?

A.

Password

B.

Certificate

C.

MD5

D.

Pre-shared secret

Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.

A.

AES-128

B.

AES-256

C.

DES

D.

3DES

When configuring Anti-Spoofing, which tracking options can an Administrator select?

A.

Log, Alert, None

B.

Log, Allow Packets, Email

C.

Drop Packet, Alert, None

D.

Log, Send SNMP Trap, Email

A layer can support different combinations of blades What are the supported blades:

A.

Firewall. URLF, Content Awareness and Mobile Access

B.

Firewall (Network Access Control). Application & URL Filtering. Content Awareness and Mobile Access

C.

Firewall. NAT, Content Awareness and Mobile Access

D.

Firewall (Network Access Control). Application & URL Filtering and Content Awareness