What are the three deployment considerations for a secure network?
A. Distributed, Bridge Mode, and Remote
B. Bridge Mode, Remote, and Standalone
C. Remote, Standalone, and Distributed
D. Standalone, Distributed, and Bridge Mode
Which of the following situations would not require a new license to be generated and installed?
A. The Security Gateway is upgraded.
B. The existing license expires.
C. The license is upgraded.
D. The IP address of the Security Management or Security Gateway has changed.
Which GUI tool can be used to view and apply Check Point licenses?
A. cpconfig
B. Management Command Line
C. SmartConsole
D. SmartUpdate
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
A. Verify a Security Policy
B. Open a terminal shell
C. Add a static route
D. View Security Management GUI Clients
Fill in the blanks: In _____ NAT, Only the ________ is translated.
A. Static; source
B. Simple; source
C. Hide; destination
D. Hide; source
Fill in the blank RADIUS protocol uses_____to communicate with the gateway
A. UDP
B. CCP
C. TDP
D. HTTP
Which message indicates IKE Phase 2 has completed successfully?
A. Quick Mode Complete
B. Aggressive Mode Complete
C. Main Mode Complete
D. IKE Mode Complete
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
A. Kerberos Ticket Renewed
B. Kerberos Ticket Requested
C. Account Logon
D. Kerberos Ticket Timed Out
What is the main difference between Threat Extraction and Threat Emulation?
A. Threat Emulation never delivers a file and takes more than 3 minutes to complete
B. Threat Extraction always delivers a file and takes less than a second to complete
C. Threat Emulation never delivers a file that takes less than a second to complete
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete