Which of these statements describes the Check Point ThreatCloud?
A. A worldwide collaborative security network
B. Prevents vulnerability exploits
C. Controls access to web sites based on category
D. Blocks or limits usage of web applications
Which of these is a Check Point Firewall attribute?
A. Malicious P2P application protection
B. Buffer overflow prevention
C. Worm injection blocking
D. Granular access control
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
A. ThreatSpect
B. ThreatWiki
C. ThreatCloud
D. ThreatEmulator
In SmartViewTracker, you see a log record of type "control" and severity "critical" for the product "Threat
Emulation" which says:
"cloud emulation failed. Reason: failed to authenticate gateway..."
What is likely to be the reason for this failure?
A. The user provided the wrong credentials to the gateway
B. The gateway should be configured in a way that Threat Emulation can be done locally in case the cloud is not accessible
C. The cloud is not accessible right now
D. Verify the gateway license / contract
How can SmartEvent be launched out of SmartDashboard?
A. Threat Prevention Tab > Launch SmartEvent
B. Menu SmartConsole > SmartEvent
C. Menu SmartConsole > SmartEvent or Threat Prevention Tab > Analyze and Report
D. SmartEvent has always to be launched via Start > Programs
The Threat Prevention software blade:
A. Is configured in one unified policy for Anti-Bot and Anti-virus functions and uses the same threat repository.
B. Can only be deployed as part of SensorNET.
C. Is a free function that does not require additional licensing.
D. Can only be deployed on a Security Gateway running GAiA.
When the feature ______________ is ON, the Gateway does not block DNS requests that were identified as malicious. Instead it sends a false response with a bogus IP address to the client.
A. Malware DNS Blacklist
B. Malware DNS Trap
C. Malware DNS Sinkhole
D. Malware DNS Blackhole
Joey is the MegaCorp Firewall administrator. Which options does he have for the configuration of the Threat Emulation Analysis Location on his gateway?
A. Only Check Point Threat Cloud
B. Upload the Files to the Check Point SFTP-Server
C. It depends on the operating systems that need to be supported
D. Either Check Point Threat Cloud or locally (dedicated or existing gateway)
SmartLog displays:
A. Information about known threats and provides steps for remediation
B. Events in chart format, with detailed data about threats
C. Real time data, to help identify ongoing threats
D. Historic data that can be used for research purposes
Which of the following are valid Boolean search terms that can be used in custom SmartLog queries?
A. And, or, with
B. And, or, not
C. None, Boolean search terms cannot be used in SmartLog.
D. And, or, not, with