Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When a gateway requires user information for authentication, what order does it query servers for user information?

A.

First - Internal user database, then LDAP servers in order of priority, finally the generic external user profile

B.

First the Internal user database, then generic external user profile, finally LDAP servers in order of priority.

C.

First the highest priority LDAP server, then the internal user database, then lower priority LDAP servers, finally the generic external profile

D.

The external generic profile, then the internal user database finally the LDAP servers in order of priority.

Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?

A.

Enterprise Network Security Appliances

B.

Rugged Appliances

C.

Scalable Platforms

D.

Small Business and Branch Office Appliances

Fill in the blanks: There are ________ types of software containers ________.

A.

Three; security management, Security Gateway, and endpoint security

B.

Three; Security gateway, endpoint security, and gateway management

C.

Two; security management and endpoint security

D.

Two; endpoint security and Security Gateway

Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.

A.

SHA-256

B.

SHA-200

C.

MD5

D.

SHA-128

What is the RFC number that act as a best practice guide for NAT?

A.

RFC 1939

B.

RFC 1950

C.

RFC 1918

D.

RFC 793

Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____

A.

User Center

B.

User Administration

C.

User Directory

D.

UserCheck

Which option in tracking allows you to see the amount of data passed in the connection?

A.

Data

B.

Accounting

C.

Logs

D.

Advanced

In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?

A.

"Inspect", "Bypass"

B.

"Inspect", "Bypass", "Categorize"

C.

"Inspect", "Bypass", "Block"

D.

"Detect", "Bypass"

Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?

A.

SmartEvent

B.

SmartView Tracker

C.

SmartLog

D.

SmartView Monitor

Identity Awareness allows easy configuration for network access and auditing based on what three items?

A.

Client machine IP address.

B.

Network location, the identity of a user and the identity of a machine.

C.

Log server IP address.

D.

Gateway proxy IP address.