Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When an encrypted packet is decrypted, where does this happen?

A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

What is the main objective when using Application Control?

A.

To filter out specific content.

B.

To assist the firewall blade with handling traffic.

C.

To see what users are doing.

D.

Ensure security and privacy of information.

Which Check Point software blade provides Application Security and identity control?

A.

Identity Awareness

B.

Data Loss Prevention

C.

URL Filtering

D.

Application Control

In SmartConsole, on which tab are Permissions and Administrators defined?

A.

Manage and Settings

B.

Logs and Monitor

C.

Security Policies

D.

Gateways and Servers

Consider the Global Properties following settings:

The selected option “Accept Domain Name over UDP (Queries)” means:

A.

UDP Queries will be accepted by the traffic allowed only through interfaces with external anti-spoofing topology and this will be done before first explicit rule written by Administrator in a Security Policy.

B.

All UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

C.

No UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

D.

All UDP Queries will be accepted by the traffic allowed by first explicit rule written by Administrator in a Security Policy.

Name the utility that is used to block activities that appear to be suspicious.

A.

Penalty Box

B.

Drop Rule in the rulebase

C.

Suspicious Activity Monitoring (SAM)

D.

Stealth rule

When changes are made to a Rule base, it is important to _______________ to enforce changes.

A.

Publish database

B.

Activate policy

C.

Install policy

D.

Save changes

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

A.

True, CLI is the prefer method for Licensing

B.

False, Central License are handled via Security Management Server

C.

False, Central License are installed via Gaia on Security Gateways

D.

True, Central License can be installed with CPLIC command on a Security Gateway

How Capsule Connect and Capsule Workspace differ?

A.

Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications

B.

Capsule Workspace can provide access to any application

C.

Capsule Connect provides Business data isolation

D.

Capsule Connect does not require an installed application at client

Which of the following is NOT a tracking log option in R80.x?

A.

Log

B.

Full Log

C.

Detailed Log

D.

Extended Log