Which of these statements describes the Check Point URL Filtering software blade?
Answer : B
An Administrator would like to control access to malware and phishing websites. Which
Check Point blades would be needed to address these requirements?
Answer : B
In setting up your first Application Control Policy for discovery. What is the best Rule Track to choose?
Answer : D
During the Application Control Discovery process, what is the best source of information for decisions on blocking or not blocking an application?
Answer : C
Mafiawars is a game that can be accessed from the Facebook Website. Although the firewall administrator has set up a rule to block Facebook games, Bob is able to access
Mafiawars from the internal network. Why?
Answer : A
When the Application Control Blade discovers an application, it will provide information on that application's properties, simple and complex. Which is an example of a complex property?
Answer : A
Which of these statements describes the Check Point Application Control software blade?
Answer : B
Which of these statements describes the Check Point ThreatCloud?
Answer : C
How can cached usernames and passwords be cleared from the memory of a security gateway?
Answer : A
Which of the following actions applies to a Risk Level of 4 – High?
Answer : A
Which of the following phrases describes a Botnet?
Answer : A
When the Application Control Blade discovers an application, it will provide information on that application's complex properties. Which is an example of a complex property?
Answer : D
Which statement is TRUE concerning the Secure Web Gateway default configuration?
Answer : A
To update both the Management Server and the Security Gateways with the latest
Application Control data and applications, you must:
Answer : B