Exam 3: Check Point Certified Security Expert - R80

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the most ideal Synchronization Status for Security Management Server High Availability deployment?

(Multiple Choice)
4.9/5
(40)

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

(Multiple Choice)
4.8/5
(42)

After verifying that API Server is not running, how can you start the API Server?

(Multiple Choice)
4.7/5
(36)

There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?

(Multiple Choice)
4.9/5
(35)

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with __________________ will not apply.

(Multiple Choice)
4.7/5
(38)

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

(Multiple Choice)
4.8/5
(44)

Which web services protocol is used to communicate to the Check Point R80 Identity Awareness Web API?

(Multiple Choice)
4.7/5
(41)

The Event List within the Event tab contains:

(Multiple Choice)
4.9/5
(29)

Fill in the blank: __________ information is included in "Full Log" tracking option, but is not included in "Log" tracking option?

(Multiple Choice)
4.9/5
(39)

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?

(Multiple Choice)
4.8/5
(39)

The Correlation Unit performs all but the following actions:

(Multiple Choice)
4.9/5
(33)

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

(Multiple Choice)
4.9/5
(38)

What are the main stages of a policy installations?

(Multiple Choice)
4.9/5
(43)

From SecureXL perspective, what are the three paths of traffic flow:

(Multiple Choice)
4.9/5
(38)

What kind of information would you expect to see using the "sim affinity -l" command?

(Multiple Choice)
4.7/5
(35)

You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor. Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?

(Multiple Choice)
5.0/5
(40)

GAIA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:

(Multiple Choice)
4.9/5
(46)

Which is NOT an example of a Check Point API?

(Multiple Choice)
4.9/5
(36)

Which command shows detailed information about VPN tunnels?

(Multiple Choice)
4.8/5
(33)

What API command below creates a new host with the name "New Host" and IP address of "192.168.0.10"?

(Multiple Choice)
4.9/5
(42)
Showing 301 - 320 of 340
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)