What are the two deployment options available for a security gateway?
A. Bridge and Switch
B. Local and Remote
C. Cloud and Router
D. Standalone and Distributed
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
A. Security Zones are not supported by Check Point firewalls.
B. The firewall rule can be configured to include one or more subnets in a zone.
C. The zone is based on the network topology and determined according to where the interface leads to.
D. The local directly connected subnet defined by the subnet IP and subnet mask.
What is UserCheck?
A. Messaging tool used to verify a user's credentials.
B. Communication tool used to inform a user about a website or application they are trying to access.
C. Communication tool used to notify an administrator when a new user is created.
D. Administrator tool used to monitor users on their network.
Which path below is available only when CoreXL is enabled?
A. Slow path
B. Firewall path
C. Medium path
D. Accelerated path
What protocol is specifically used for clustered environments?
A. Clustered Protocol
B. Synchronized Cluster Protocol
C. Control Cluster Protocol
D. Cluster Control Protocol
The Captive Portal tool:
A. Acquires identities from unidentified users.
B. Is only used for guest user authentication.
C. Allows access to users already identified.
D. Is deployed from the Identity Awareness page in the Global Properties settings.
What are the steps to configure the HTTPS Inspection Policy?
A. Go to ManageandSettings > Blades > HTTPS Inspection > Configure in SmartDashboard
B. Go to Applicationandurl filtering blade > Advanced > Https Inspection > Policy
C. Go to ManageandSettings > Blades > HTTPS Inspection > Policy
D. Go to Applicationandurl filtering blade > Https Inspection > Policy
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
A. DLP
B. SSL Inspection
C. Application Control
D. URL Filtering
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?
A. Check Point software deployed on a non-Check Point appliance.
B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability.
C. A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.
D. A check Point Management Server software using the Open SSL.
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
A. Firewall
B. Application Control
C. Anti-spam and Email Security
D. Antivirus