How many users can have read/write access in Gaia at on…
How many users can have read/write access in Gaia at one time?
Which Check Point software blade provides visibility of…
Which Check Point software blade provides visibility of users, groups and machines while also providing
access control through identity-based policies?
Fill in the blank: The R80 SmartConsole, SmartEvent GUI…
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and
shows them as prioritized security events.
Fill in the blank: RADIUS Accounting gets ______ data f…
Fill in the blank: RADIUS Accounting gets ______ data from requests generated by the accounting client
Fill in the blank: The IPS policy for pre-R80 gateways …
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
Fill in the blank: A(n) _____ rule is created by an adm…
Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and before last
rules in the Rule Base.
Fill in the blank: Licenses can be added to the License…
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
How many rules on Check Point Firewall are required for…
Joey is using the computer with IP address 192.168.20.13. He wants to access web page “www.Check
Point.com”, which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point
Firewall are required for this connection?
Which command is used to obtain the configuration lock …
Which command is used to obtain the configuration lock in Gaia?
Which of the following is NOT a set of Regulatory Requi…
Which of the following is NOT a set of Regulatory Requirements related to Information Security?