What is the mechanism behind Threat Extraction?
Correct Answer:
D
When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?
Correct Answer:
B
Check Point ClusterXL Active/Active deployment is used when:
Correct Answer:
D
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
Correct Answer:
D
Identity Awareness gets identities from these acquisition sources:
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
Correct Answer:
A