MultipleChoice
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data.
Which component is NOT part of the SandBlast Mobile solution?
OptionsMultipleChoice
The command ___________ provides the most complete restoration of a R80 configuration.
OptionsMultipleChoice
The R80 feature ______ permits blocking specific IP addresses for a specific time period.
OptionsMultipleChoice
The R80 utility fw monitor is used to troubleshoot ________.
OptionsMultipleChoice
On R80.10 when configuring Third-Party devices o read the logs using the LEA (Log Export API) the default Log Server uses port:
OptionsMultipleChoice
Which of the following is NOT a type of Check point API available in R80?
OptionsMultipleChoice
How would you deplue TE250x Check Point appliance h=just for email traffic and inline mode without a Check point Security Gateway?
OptionsMultipleChoice
SecureXL non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
OptionsMultipleChoice
: 146
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?
OptionsMultipleChoice
In SmartEvent, what are different types of automatic reactions that the administrator can configure?
Options