Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
A. Data Awareness
B. Threat Emulation
C. Application Control
D. Identity Awareness
Why is a Central License the preferred and recommended method of licensing?
A. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
B. Central Licensing actually not supported with Gaia.
C. Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
D. Central Licensing is the only option when deploying Gaia.
Fill in the blanks: Gaia can be configured using the ______ or ______.
A. GaiaUI; command line interface (serial console only)
B. Gaia Interface; Gaia Ultimate Shell
C. Command line interface; GAiA Portal
D. Web Ultimate Interface; Gaia Interface (SSH)
What is the user ID of a user that have all the privileges of a root user?
A. User ID 99
B. User ID 1
C. User ID 2
D. User ID 0
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
A. True, CLI is the prefer method for Licensing
B. False, Central License are handled via Security Management Server
C. False, Central License are installed via Gaia on Security Gateways
D. True, Central License can be installed with CPLIC command on a Security Gateway
Which of the following is NOT defined by an Access Role object?
A. Source Network
B. Source Machine
C. Source User
D. Source Server
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
A. In the SmartView Tracker, if you activate the column Matching Rate.
B. In SmartReporter, in the section Firewall Blade ?Activity>; Network Activity with information concerning Top Matched Logged Rules.
C. SmartReporter provides this information in the section Firewall Blade ?Security>; Rule Base Analysis with information concerning Top Matched Logged Rules.
D. It is not possible to see it directly. You can open SmartDashboard and select UserDefined in the Track column. Afterwards, you need to create your own program with an external counter.
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
A. Go to clash-Run cpstop | Run cpstart
B. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
C. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores
D. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
From SecureXL perspective, what are the tree paths of traffic flow:
A. Initial Path; Medium Path; Accelerated Path
B. Layer Path; Blade Path; Rule Path
C. Firewall Path; Accept Path; Drop Path
D. Firewall Path; Accelerated Path; Medium Path
The Gaia operating system supports which routing protocols?
A. BGP, OSPF, RIP
B. BGP, OSPF, EIGRP, PIM, IGMP
C. BGP, OSPF, RIP, PIM, IGMP
D. BGP, OSPF, RIP, EIGRP