MultipleChoice
What is the order of NAT priorities'?
OptionsMultipleChoice
Which command is used to add users to or from existing roles'?
OptionsMultipleChoice
What are two basic rules Check Point recommends for building an effective security policy?
OptionsMultipleChoice
In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)
OptionsMultipleChoice
Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all of the following except:
OptionsMultipleChoice
Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?
OptionsMultipleChoice
The default method for destination NAT is _____________, where NAT occurs on the Inbound interface closest to the client.
OptionsMultipleChoice
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).
Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.
If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.
Which of the following is the BEST for this behavior?
OptionsMultipleChoice
What are types of Check Point APIs available currently as part of R80.10 code?
OptionsMultipleChoice
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers?
Options