- (Exam Topic 3)
What is the purpose of Priority Delta in VRRP?
Correct Answer:
C
- (Exam Topic 3)
What is the mechanism behind Threat Extraction?
Correct Answer:
D
- (Exam Topic 1)
What are the three conflict resolution rules in the Threat Prevention Policy Layers?
Correct Answer:
C
- (Exam Topic 1)
On the following graphic, you will find layers of policies.
What is a precedence of traffic inspection for the defined polices?
Correct Answer:
B
To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a set of rules, or a Rule Base.
For example, when you upgrade to R80 from earlier versions:
Gateways that have the Firewall and the Application Control Software Blades enabled will have their Access Control Policy split into two ordered layers: Network and Applications.
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer.
Gateways that have the IPS and Threat Emulation Software Blades enabled will have their Threat Prevention policies split into two parallel layers: IPS and Threat Prevention.
All layers are evaluated in parallel
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer.
All layers are evaluated in parallel
- (Exam Topic 3)
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?
Correct Answer:
C